Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2020-6556 (GCVE-0-2020-6556)
Vulnerability from cvelistv5 – Published: 2020-09-21 19:06 – Updated: 2024-08-04 09:11- Heap buffer overflow
| URL | Tags |
|---|---|
| https://crbug.com/1115345 | x_refsource_MISC |
| https://chromereleases.googleblog.com/2020/08/sta… | x_refsource_MISC |
| https://lists.fedoraproject.org/archives/list/pac… | vendor-advisoryx_refsource_FEDORA |
| http://lists.opensuse.org/opensuse-security-annou… | vendor-advisoryx_refsource_SUSE |
| https://www.debian.org/security/2021/dsa-4824 | vendor-advisoryx_refsource_DEBIAN |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T09:11:04.601Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://crbug.com/1115345"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_18.html"
},
{
"name": "FEDORA-2020-6da740d38c",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EE7XWIZBME7JAY7N6CGPET4CLNHHEIVT/"
},
{
"name": "openSUSE-SU-2020:1713",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html"
},
{
"name": "DSA-4824",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "https://www.debian.org/security/2021/dsa-4824"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Chrome",
"vendor": "Google",
"versions": [
{
"lessThan": "84.0.4147.135",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Heap buffer overflow in SwiftShader in Google Chrome prior to 84.0.4147.135 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Heap buffer overflow",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-01-02T15:07:33.000Z",
"orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
"shortName": "Chrome"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://crbug.com/1115345"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_18.html"
},
{
"name": "FEDORA-2020-6da740d38c",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EE7XWIZBME7JAY7N6CGPET4CLNHHEIVT/"
},
{
"name": "openSUSE-SU-2020:1713",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html"
},
{
"name": "DSA-4824",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "https://www.debian.org/security/2021/dsa-4824"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "chrome-cve-admin@google.com",
"ID": "CVE-2020-6556",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Chrome",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "84.0.4147.135"
}
]
}
}
]
},
"vendor_name": "Google"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Heap buffer overflow in SwiftShader in Google Chrome prior to 84.0.4147.135 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Heap buffer overflow"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://crbug.com/1115345",
"refsource": "MISC",
"url": "https://crbug.com/1115345"
},
{
"name": "https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_18.html",
"refsource": "MISC",
"url": "https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_18.html"
},
{
"name": "FEDORA-2020-6da740d38c",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EE7XWIZBME7JAY7N6CGPET4CLNHHEIVT/"
},
{
"name": "openSUSE-SU-2020:1713",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html"
},
{
"name": "DSA-4824",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2021/dsa-4824"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
"assignerShortName": "Chrome",
"cveId": "CVE-2020-6556",
"datePublished": "2020-09-21T19:06:48.000Z",
"dateReserved": "2020-01-08T00:00:00.000Z",
"dateUpdated": "2024-08-04T09:11:04.601Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2020-6556",
"date": "2026-05-20",
"epss": "0.0188",
"percentile": "0.83371"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"84.0.4147.125\", \"matchCriteriaId\": \"FF2D9DD8-01E9-44BB-83A5-F7CBBA43535E\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E460AA51-FCDA-46B9-AE97-E6676AA5E194\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B620311B-34A3-48A6-82DF-6F078D7A4493\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B009C22E-30A4-4288-BCF6-C3E81DEAF45A\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Heap buffer overflow in SwiftShader in Google Chrome prior to 84.0.4147.135 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\"}, {\"lang\": \"es\", \"value\": \"Un desbordamiento del b\\u00fafer de la pila en SwiftShader en Google Chrome versiones anteriores a 84.0.4147.135, permit\\u00eda a un atacante remoto explotar potencialmente una corrupci\\u00f3n de la pila por medio de una p\\u00e1gina HTML dise\\u00f1ada\"}]",
"id": "CVE-2020-6556",
"lastModified": "2024-11-21T05:35:57.343",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:C/I:C/A:C\", \"baseScore\": 9.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 8.6, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
"published": "2020-09-21T20:15:14.493",
"references": "[{\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_18.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://crbug.com/1115345\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EE7XWIZBME7JAY7N6CGPET4CLNHHEIVT/\", \"source\": \"chrome-cve-admin@google.com\"}, {\"url\": \"https://www.debian.org/security/2021/dsa-4824\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_18.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://crbug.com/1115345\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EE7XWIZBME7JAY7N6CGPET4CLNHHEIVT/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.debian.org/security/2021/dsa-4824\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
"sourceIdentifier": "chrome-cve-admin@google.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-787\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2020-6556\",\"sourceIdentifier\":\"chrome-cve-admin@google.com\",\"published\":\"2020-09-21T20:15:14.493\",\"lastModified\":\"2024-11-21T05:35:57.343\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Heap buffer overflow in SwiftShader in Google Chrome prior to 84.0.4147.135 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\"},{\"lang\":\"es\",\"value\":\"Un desbordamiento del b\u00fafer de la pila en SwiftShader en Google Chrome versiones anteriores a 84.0.4147.135, permit\u00eda a un atacante remoto explotar potencialmente una corrupci\u00f3n de la pila por medio de una p\u00e1gina HTML dise\u00f1ada\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\"baseScore\":9.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"84.0.4147.125\",\"matchCriteriaId\":\"FF2D9DD8-01E9-44BB-83A5-F7CBBA43535E\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E460AA51-FCDA-46B9-AE97-E6676AA5E194\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B620311B-34A3-48A6-82DF-6F078D7A4493\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B009C22E-30A4-4288-BCF6-C3E81DEAF45A\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_18.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://crbug.com/1115345\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EE7XWIZBME7JAY7N6CGPET4CLNHHEIVT/\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"https://www.debian.org/security/2021/dsa-4824\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_18.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://crbug.com/1115345\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EE7XWIZBME7JAY7N6CGPET4CLNHHEIVT/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.debian.org/security/2021/dsa-4824\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
}
}
CERTFR-2020-AVI-515
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été découverte dans Google Chrome. Elle permet à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Google Chrome versions ant\u00e9rieures \u00e0 84.0.4147.135",
"product": {
"name": "Chrome",
"vendor": {
"name": "Google",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-6556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6556"
}
],
"links": [],
"reference": "CERTFR-2020-AVI-515",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-08-19T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Google Chrome. Elle permet \u00e0 un\nattaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par\nl\u0027\u00e9diteur.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans Google Chrome",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Google du 18 ao\u00fbt 2020",
"url": "https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_18.html"
}
]
}
CERTFR-2020-AVI-515
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été découverte dans Google Chrome. Elle permet à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Google Chrome versions ant\u00e9rieures \u00e0 84.0.4147.135",
"product": {
"name": "Chrome",
"vendor": {
"name": "Google",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-6556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6556"
}
],
"links": [],
"reference": "CERTFR-2020-AVI-515",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-08-19T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Google Chrome. Elle permet \u00e0 un\nattaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par\nl\u0027\u00e9diteur.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans Google Chrome",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Google du 18 ao\u00fbt 2020",
"url": "https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_18.html"
}
]
}
BDU:2021-01713
Vulnerability from fstec - Published: 21.09.2020{
"CVSS 2.0": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS 3.0": null,
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb, \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, Novell Inc., Fedora Project, Google Inc, \u0410\u041e \"\u041d\u041f\u041f\u041a\u0422\", \u0410\u041e \u00ab\u041a\u043e\u043d\u0446\u0435\u0440\u043d \u0412\u041d\u0418\u0418\u041d\u0421\u00bb",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (Astra Linux Special Edition), 2.12 \u00ab\u041e\u0440\u0451\u043b\u00bb (Astra Linux Common Edition), 10 (Debian GNU/Linux), 15.1 NonFree (OpenSUSE Leap), 33 (Fedora), 15.2 NonFree (OpenSUSE Leap), \u0434\u043e 84.0.4147.125 (Google Chrome), \u0434\u043e 2.1 (\u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx), \u0434\u043e 16.01.2023 (\u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f Google Chrome:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0434\u043e 88.0.4324.182-1 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u0437\u0434\u043d\u0435\u0439 \u0432\u0435\u0440\u0441\u0438\u0438\n\n\u0414\u043b\u044f Debian:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f (\u043f\u0430\u043a\u0435\u0442\u0430 chromium) \u0434\u043e 87.0.4280.141-0.1~deb10u1 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u0437\u0434\u043d\u0435\u0439 \u0432\u0435\u0440\u0441\u0438\u0438\n\n\u0414\u043b\u044f Astra Linux:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f (\u043f\u0430\u043a\u0435\u0442\u0430 chromium) \u0434\u043e 87.0.4280.141-0.1~deb10u1 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u0437\u0434\u043d\u0435\u0439 \u0432\u0435\u0440\u0441\u0438\u0438\n\u0418 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se16-bulletin-20210730SE16\n\n\u0414\u043b\u044f Fedora:\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EE7XWIZBME7JAY7N6CGPET4CLNHHEIVT/\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Novell Inc.:\nhttps://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html\n\n\u0414\u043b\u044f \u041e\u0421\u041e\u041d \u041e\u0441\u043d\u043e\u0432\u0430:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f chromium \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 90.0.4430.212+repack-1~deb10u1.osnova2\n\n\u0414\u043b\u044f \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f chromium \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 105.0.5195.125+repack2-1~deb11u1.osnova1.strelets",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "21.09.2020",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "21.11.2023",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "30.03.2021",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2021-01713",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2020-6556",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Astra Linux Special Edition (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), Astra Linux Common Edition (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21164433), Debian GNU/Linux, OpenSUSE Leap, Fedora, Google Chrome, \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165913), \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21166177)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Common Edition 2.12 \u00ab\u041e\u0440\u0451\u043b\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21164433), \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 10 , Novell Inc. OpenSUSE Leap 15.1 NonFree , Fedora Project Fedora 33 , Novell Inc. OpenSUSE Leap 15.2 NonFree , \u0410\u041e \u00ab\u041a\u043e\u043d\u0446\u0435\u0440\u043d \u0412\u041d\u0418\u0418\u041d\u0421\u00bb \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb \u0434\u043e 16.01.2023 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21166177)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 SwiftShader \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0430 Google Chrome, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u0432\u044b\u0445\u043e\u0434\u043e\u043c \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0438 \u0437\u0430 \u0434\u043e\u043f\u0443\u0441\u0442\u0438\u043c\u044b\u0435 \u0433\u0440\u0430\u043d\u0438\u0446\u044b \u0431\u0443\u0444\u0435\u0440\u0430 \u0434\u0430\u043d\u043d\u044b\u0445, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u043c \u0434\u0430\u043d\u043d\u044b\u043c, \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u044c \u0438\u0445 \u0446\u0435\u043b\u043e\u0441\u0442\u043d\u043e\u0441\u0442\u044c, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0417\u0430\u043f\u0438\u0441\u044c \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u0430\u043c\u0438 \u0431\u0443\u0444\u0435\u0440\u0430 (CWE-787)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 SwiftShader \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0430 Google Chrome \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0432\u044b\u0445\u043e\u0434\u043e\u043c \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0438 \u0437\u0430 \u0434\u043e\u043f\u0443\u0441\u0442\u0438\u043c\u044b\u0435 \u0433\u0440\u0430\u043d\u0438\u0446\u044b \u0431\u0443\u0444\u0435\u0440\u0430 \u0434\u0430\u043d\u043d\u044b\u0445. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u043c \u0434\u0430\u043d\u043d\u044b\u043c, \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u044c \u0438\u0445 \u0446\u0435\u043b\u043e\u0441\u0442\u043d\u043e\u0441\u0442\u044c, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_18.html\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EE7XWIZBME7JAY7N6CGPET4CLNHHEIVT/\nhttps://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html\nhttps://nvd.nist.gov/vuln/detail/CVE-2020-6556\nhttps://security-tracker.debian.org/tracker/CVE-2020-6556\nhttps://wiki.astralinux.ru/astra-linux-se16-bulletin-20210611SE16\nhttps://\u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430.\u043d\u043f\u043f\u043a\u0442.\u0440\u0444/bin/view/\u041e\u0421\u043d\u043e\u0432\u0430/\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f/2.1/\nhttps://strelets.net/patchi-i-obnovleniya-bezopasnosti#16012023",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-787",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 9,3)"
}
CNVD-2020-47550
Vulnerability from cnvd - Published: 2020-08-21厂商已发布了漏洞修复程序,请及时关注更新: https://chromereleases.googleblog.com/
| Name | Google Chrome <84.0.4147.135 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2020-6556",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2020-6556"
}
},
"description": "Google Chrome\u662f\u7f8e\u56fd\u8c37\u6b4c\uff08Google\uff09\u516c\u53f8\u7684\u4e00\u6b3eWeb\u6d4f\u89c8\u5668\u3002\n\nGoogle Chrome 84.0.4147.135\u4e4b\u524d\u7248\u672c\u4e2d\u7684SwiftShader\u5b58\u5728\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u4efb\u610f\u4ee3\u7801\u6216\u9020\u6210\u5e94\u7528\u7a0b\u5e8f\u5d29\u6e83\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://chromereleases.googleblog.com/",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2020-47550",
"openTime": "2020-08-21",
"patchDescription": "Google Chrome\u662f\u7f8e\u56fd\u8c37\u6b4c\uff08Google\uff09\u516c\u53f8\u7684\u4e00\u6b3eWeb\u6d4f\u89c8\u5668\u3002\r\n\r\nGoogle Chrome 84.0.4147.135\u4e4b\u524d\u7248\u672c\u4e2d\u7684SwiftShader\u5b58\u5728\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u4efb\u610f\u4ee3\u7801\u6216\u9020\u6210\u5e94\u7528\u7a0b\u5e8f\u5d29\u6e83\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Google Chrome\u5806\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff08CNVD-2020-47550\uff09\u7684\u8865\u4e01",
"products": {
"product": "Google Chrome \u003c84.0.4147.135"
},
"referenceLink": "https://chromereleases.googleblog.com/",
"serverity": "\u4e2d",
"submitTime": "2020-08-19",
"title": "Google Chrome\u5806\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff08CNVD-2020-47550\uff09"
}
FKIE_CVE-2020-6556
Vulnerability from fkie_nvd - Published: 2020-09-21 20:15 - Updated: 2024-11-21 05:35| Vendor | Product | Version | |
|---|---|---|---|
| chrome | * | ||
| debian | debian_linux | 10.0 | |
| fedoraproject | fedora | 33 | |
| opensuse | leap | 15.1 | |
| opensuse | leap | 15.2 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FF2D9DD8-01E9-44BB-83A5-F7CBBA43535E",
"versionEndExcluding": "84.0.4147.125",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B009C22E-30A4-4288-BCF6-C3E81DEAF45A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Heap buffer overflow in SwiftShader in Google Chrome prior to 84.0.4147.135 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page."
},
{
"lang": "es",
"value": "Un desbordamiento del b\u00fafer de la pila en SwiftShader en Google Chrome versiones anteriores a 84.0.4147.135, permit\u00eda a un atacante remoto explotar potencialmente una corrupci\u00f3n de la pila por medio de una p\u00e1gina HTML dise\u00f1ada"
}
],
"id": "CVE-2020-6556",
"lastModified": "2024-11-21T05:35:57.343",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2020-09-21T20:15:14.493",
"references": [
{
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html"
},
{
"source": "chrome-cve-admin@google.com",
"tags": [
"Vendor Advisory"
],
"url": "https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_18.html"
},
{
"source": "chrome-cve-admin@google.com",
"tags": [
"Third Party Advisory"
],
"url": "https://crbug.com/1115345"
},
{
"source": "chrome-cve-admin@google.com",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EE7XWIZBME7JAY7N6CGPET4CLNHHEIVT/"
},
{
"source": "chrome-cve-admin@google.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2021/dsa-4824"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_18.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://crbug.com/1115345"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EE7XWIZBME7JAY7N6CGPET4CLNHHEIVT/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2021/dsa-4824"
}
],
"sourceIdentifier": "chrome-cve-admin@google.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-FFFR-W5CQ-WGHR
Vulnerability from github – Published: 2022-05-24 17:29 – Updated: 2022-06-30 00:00Heap buffer overflow in SwiftShader in Google Chrome prior to 84.0.4147.135 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
{
"affected": [],
"aliases": [
"CVE-2020-6556"
],
"database_specific": {
"cwe_ids": [
"CWE-787"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2020-09-21T20:15:00Z",
"severity": "HIGH"
},
"details": "Heap buffer overflow in SwiftShader in Google Chrome prior to 84.0.4147.135 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"id": "GHSA-fffr-w5cq-wghr",
"modified": "2022-06-30T00:00:30Z",
"published": "2022-05-24T17:29:07Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-6556"
},
{
"type": "WEB",
"url": "https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_18.html"
},
{
"type": "WEB",
"url": "https://crbug.com/1115345"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EE7XWIZBME7JAY7N6CGPET4CLNHHEIVT"
},
{
"type": "WEB",
"url": "https://www.debian.org/security/2021/dsa-4824"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
GSD-2020-6556
Vulnerability from gsd - Updated: 2023-12-13 01:21{
"GSD": {
"alias": "CVE-2020-6556",
"description": "Heap buffer overflow in SwiftShader in Google Chrome prior to 84.0.4147.135 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"id": "GSD-2020-6556",
"references": [
"https://www.suse.com/security/cve/CVE-2020-6556.html",
"https://www.debian.org/security/2021/dsa-4824",
"https://access.redhat.com/errata/RHSA-2020:3560"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2020-6556"
],
"details": "Heap buffer overflow in SwiftShader in Google Chrome prior to 84.0.4147.135 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"id": "GSD-2020-6556",
"modified": "2023-12-13T01:21:54.968159Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "chrome-cve-admin@google.com",
"ID": "CVE-2020-6556",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Chrome",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "84.0.4147.135"
}
]
}
}
]
},
"vendor_name": "Google"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Heap buffer overflow in SwiftShader in Google Chrome prior to 84.0.4147.135 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Heap buffer overflow"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://crbug.com/1115345",
"refsource": "MISC",
"url": "https://crbug.com/1115345"
},
{
"name": "https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_18.html",
"refsource": "MISC",
"url": "https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_18.html"
},
{
"name": "FEDORA-2020-6da740d38c",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EE7XWIZBME7JAY7N6CGPET4CLNHHEIVT/"
},
{
"name": "openSUSE-SU-2020:1713",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html"
},
{
"name": "DSA-4824",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2021/dsa-4824"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "84.0.4147.125",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "chrome-cve-admin@google.com",
"ID": "CVE-2020-6556"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Heap buffer overflow in SwiftShader in Google Chrome prior to 84.0.4147.135 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_18.html",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_18.html"
},
{
"name": "https://crbug.com/1115345",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "https://crbug.com/1115345"
},
{
"name": "FEDORA-2020-6da740d38c",
"refsource": "FEDORA",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EE7XWIZBME7JAY7N6CGPET4CLNHHEIVT/"
},
{
"name": "openSUSE-SU-2020:1713",
"refsource": "SUSE",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html"
},
{
"name": "DSA-4824",
"refsource": "DEBIAN",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2021/dsa-4824"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": true
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2022-06-29T19:51Z",
"publishedDate": "2020-09-21T20:15Z"
}
}
}
OPENSUSE-SU-2020:1260-1
Vulnerability from csaf_opensuse - Published: 2020-08-26 12:21 - Updated: 2020-08-26 12:21| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:chromedriver-84.0.4147.135-lp151.2.120.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:chromium-84.0.4147.135-lp151.2.120.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for chromium",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for chromium fixes the following issues:\n\n- Update to 84.0.4147.135 (boo#1175505):\n * CVE-2020-6556: Heap buffer overflow in SwiftShader\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2020-1260",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_1260-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2020:1260-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IE6SQQVOZMCOQYOLQVPBDWWESR72QMSE/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2020:1260-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IE6SQQVOZMCOQYOLQVPBDWWESR72QMSE/"
},
{
"category": "self",
"summary": "SUSE Bug 1175505",
"url": "https://bugzilla.suse.com/1175505"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6556 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6556/"
}
],
"title": "Security update for chromium",
"tracking": {
"current_release_date": "2020-08-26T12:21:41Z",
"generator": {
"date": "2020-08-26T12:21:41Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2020:1260-1",
"initial_release_date": "2020-08-26T12:21:41Z",
"revision_history": [
{
"date": "2020-08-26T12:21:41Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "chromedriver-84.0.4147.135-lp151.2.120.1.x86_64",
"product": {
"name": "chromedriver-84.0.4147.135-lp151.2.120.1.x86_64",
"product_id": "chromedriver-84.0.4147.135-lp151.2.120.1.x86_64"
}
},
{
"category": "product_version",
"name": "chromium-84.0.4147.135-lp151.2.120.1.x86_64",
"product": {
"name": "chromium-84.0.4147.135-lp151.2.120.1.x86_64",
"product_id": "chromium-84.0.4147.135-lp151.2.120.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.1",
"product": {
"name": "openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-84.0.4147.135-lp151.2.120.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:chromedriver-84.0.4147.135-lp151.2.120.1.x86_64"
},
"product_reference": "chromedriver-84.0.4147.135-lp151.2.120.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-84.0.4147.135-lp151.2.120.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:chromium-84.0.4147.135-lp151.2.120.1.x86_64"
},
"product_reference": "chromium-84.0.4147.135-lp151.2.120.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-6556",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6556"
}
],
"notes": [
{
"category": "general",
"text": "Heap buffer overflow in SwiftShader in Google Chrome prior to 84.0.4147.135 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:chromedriver-84.0.4147.135-lp151.2.120.1.x86_64",
"openSUSE Leap 15.1:chromium-84.0.4147.135-lp151.2.120.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6556",
"url": "https://www.suse.com/security/cve/CVE-2020-6556"
},
{
"category": "external",
"summary": "SUSE Bug 1175505 for CVE-2020-6556",
"url": "https://bugzilla.suse.com/1175505"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:chromedriver-84.0.4147.135-lp151.2.120.1.x86_64",
"openSUSE Leap 15.1:chromium-84.0.4147.135-lp151.2.120.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:chromedriver-84.0.4147.135-lp151.2.120.1.x86_64",
"openSUSE Leap 15.1:chromium-84.0.4147.135-lp151.2.120.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-08-26T12:21:41Z",
"details": "critical"
}
],
"title": "CVE-2020-6556"
}
]
}
OPENSUSE-SU-2020:1263-1
Vulnerability from csaf_opensuse - Published: 2020-08-26 18:22 - Updated: 2020-08-26 18:22| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.2:chromedriver-84.0.4147.135-lp152.2.17.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:chromium-84.0.4147.135-lp152.2.17.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for chromium",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for chromium fixes the following issues:\n\n- Update to 84.0.4147.135 (boo#1175505):\n * CVE-2020-6556: Heap buffer overflow in SwiftShader\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2020-1263",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_1263-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2020:1263-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q2UWLD6KNTYFQW6MSDUEYKR2B64LNQ3T/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2020:1263-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q2UWLD6KNTYFQW6MSDUEYKR2B64LNQ3T/"
},
{
"category": "self",
"summary": "SUSE Bug 1175505",
"url": "https://bugzilla.suse.com/1175505"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6556 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6556/"
}
],
"title": "Security update for chromium",
"tracking": {
"current_release_date": "2020-08-26T18:22:10Z",
"generator": {
"date": "2020-08-26T18:22:10Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2020:1263-1",
"initial_release_date": "2020-08-26T18:22:10Z",
"revision_history": [
{
"date": "2020-08-26T18:22:10Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "chromedriver-84.0.4147.135-lp152.2.17.1.x86_64",
"product": {
"name": "chromedriver-84.0.4147.135-lp152.2.17.1.x86_64",
"product_id": "chromedriver-84.0.4147.135-lp152.2.17.1.x86_64"
}
},
{
"category": "product_version",
"name": "chromium-84.0.4147.135-lp152.2.17.1.x86_64",
"product": {
"name": "chromium-84.0.4147.135-lp152.2.17.1.x86_64",
"product_id": "chromium-84.0.4147.135-lp152.2.17.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.2",
"product": {
"name": "openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-84.0.4147.135-lp152.2.17.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:chromedriver-84.0.4147.135-lp152.2.17.1.x86_64"
},
"product_reference": "chromedriver-84.0.4147.135-lp152.2.17.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-84.0.4147.135-lp152.2.17.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:chromium-84.0.4147.135-lp152.2.17.1.x86_64"
},
"product_reference": "chromium-84.0.4147.135-lp152.2.17.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-6556",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6556"
}
],
"notes": [
{
"category": "general",
"text": "Heap buffer overflow in SwiftShader in Google Chrome prior to 84.0.4147.135 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:chromedriver-84.0.4147.135-lp152.2.17.1.x86_64",
"openSUSE Leap 15.2:chromium-84.0.4147.135-lp152.2.17.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6556",
"url": "https://www.suse.com/security/cve/CVE-2020-6556"
},
{
"category": "external",
"summary": "SUSE Bug 1175505 for CVE-2020-6556",
"url": "https://bugzilla.suse.com/1175505"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:chromedriver-84.0.4147.135-lp152.2.17.1.x86_64",
"openSUSE Leap 15.2:chromium-84.0.4147.135-lp152.2.17.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:chromedriver-84.0.4147.135-lp152.2.17.1.x86_64",
"openSUSE Leap 15.2:chromium-84.0.4147.135-lp152.2.17.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-08-26T18:22:10Z",
"details": "critical"
}
],
"title": "CVE-2020-6556"
}
]
}
OPENSUSE-SU-2020:1713-1
Vulnerability from csaf_opensuse - Published: 2020-10-23 10:27 - Updated: 2020-10-23 10:27| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for opera",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for opera fixes the following issues:\n\nopera was updated to version 71.0.3770.228\n\n - DNA-87466 Hide extensions icon is black in dark theme\n - DNA-88580 Implement search_in_tabs telemetry benchmark\n - DNA-88591 Allow to scroll down the Keyboards Shortcuts section\n with URL\n - DNA-88693 Random crash in SmartFilesBrowserTest\n - DNA-88793 change VPN disclaimer modal layout\n - DNA-88799 Only active workspaces and active messengers should\n be listed in keyboard shortcuts settings\n - DNA-88838 add automatic VPN connection preference setting\n - DNA-88870 Align VPN popup to new design\n - DNA-88900 Turn off Tutorials in Opera GX \u2013 implementation\n - DNA-88931 Add info about channel and product (OPR, OPRGX) to\n rollout requests\n - DNA-88940 Allow continue-shopping|booking-host-override switch\n to handle host and path\n - DNA-88946 Auto-connect VPN after browser startup only for\n existing VPN users\n - DNA-89009 Change URL for search-suggestions\n - DNA-89021 Make RH test driver pack to a separate archive\n - DNA-89150 Unhardcode \u2018From\u2019 and \u2018To\u2019 strings in Advanced\n History Search\n - DNA-89175 Desktop without a flow paring should not initialize\n in browser startup\n\nOpera was updated to version 71.0.3770.198\n\n - CHR-8106 Update chromium on desktop-stable-85-3770 to\n 85.0.4183.121\n - DNA-85648 Reconnecting Flow with iOS is unstable\n - DNA-87130 Spinner is stretched instead of clipped\n - DNA-87989 In Find in Page, \u201cNo matches\u201d doesn\u2019t go away after\n deleting all text\n - DNA-88098 Data URLs entries should not open new tab after\n click on new history page\n - DNA-88267 Extra semicolon in Russian BABE translation\n - DNA-88312 [Win] Downloads file drag and drop doesn\u2019t work in\n Opera\n - DNA-88363 Add premium extension functionality\n - DNA-88580 Implement search_in_tabs telemetry benchmark\n - DNA-88611 Black font on a dark background in sync login dialog\n - DNA-88626 Disable #easy-files on desktop-stable-85-xxxx\n - DNA-88701 String \u201cType a shortcut\u201d is hardcoded\n - DNA-88755 Crash at extensions::WebstoreOneClickInstallerUIImpl::\n RemoveAllInfobarsExcept(opera::ExtensionInstallInfoBarDelegate*)\n - DNA-88797 Change \u2018Register\u2019 to \u2018Tab\u2019 in German\n - DNA-88851 [History][Resized window] Button and date input\n look bad\n - DNA-88958 Crash at net::`anonymous namespace\u201d::Escape\n- The update to chromium 85.0.4183.121 fixes following issues:\n - CVE-2020-15960, CVE-2020-15961, CVE-2020-15962, CVE-2020-15963,\n CVE-2020-15965, CVE-2020-15966, CVE-2020-15964\n\n- Update to version 71.0.3770.148\n - CHR-8091 Update chromium on desktop-stable-85-3770 to\n 85.0.4183.102\n - DNA-87785 [Mac] \u201cAlitools\u201d text in extension toolbar overlaps\n Install button\n - DNA-87935 Make SSD smaller by 25%\n - DNA-87963 Hidden Avira extension in avira_2 edition\n - DNA-88015 [MyFlow] Desktop doesn\u2019t show itself in devices list\n - DNA-88469 Add context menu options to configure shortcuts\n - DNA-88496 Define a/b test in ab_tests.json\n - DNA-88537 Don\u2019t filter out hashes from feature reference groups\n coming from rollout\n - DNA-88580 Implement search_in_tabs telemetry benchmark\n - DNA-88604 [History panel] Search bar covers the\n \u201cClear browsing data\u201d button\n - DNA-88619 String \u2018Download complete\u2019 is cut on download popup\n - DNA-88645 Remove option should not be available for last\n workspace\n - DNA-88718 [History panel] fix delete button overflow issue\n- The update to chromium 85.0.4183.102 fixes following issues:\n - CVE-2020-6573, CVE-2020-6574, CVE-2020-6575, CVE-2020-6576,\n CVE-2020-15959\n- Complete Opera 71.0 changelog at:\n https://blogs.opera.com/desktop/changelog-for-71/\n\n- Update to version 70.0.3728.144\n - CHR-8057 Update chromium on desktop-stable-84-3728 to\n 84.0.4147.135\n - DNA-88027 [Mac] Downloads icon disappears when downloads popup\n is shown\n - DNA-88204 Crash at opera::DownloadItemView::OnMousePressed\n (ui::MouseEvent const\u0026)\n- The update to chromium 84.0.4147.135 fixes following issues:\n - CVE-2020-6556\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2020-1713",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_1713-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2020:1713-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ALGE2NBJXJCEWCYM2G2HEY7VQKRC3ZES/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2020:1713-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ALGE2NBJXJCEWCYM2G2HEY7VQKRC3ZES/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-15959 page",
"url": "https://www.suse.com/security/cve/CVE-2020-15959/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-15960 page",
"url": "https://www.suse.com/security/cve/CVE-2020-15960/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-15961 page",
"url": "https://www.suse.com/security/cve/CVE-2020-15961/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-15962 page",
"url": "https://www.suse.com/security/cve/CVE-2020-15962/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-15963 page",
"url": "https://www.suse.com/security/cve/CVE-2020-15963/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-15964 page",
"url": "https://www.suse.com/security/cve/CVE-2020-15964/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-15965 page",
"url": "https://www.suse.com/security/cve/CVE-2020-15965/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-15966 page",
"url": "https://www.suse.com/security/cve/CVE-2020-15966/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6556 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6556/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6573 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6573/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6574 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6574/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6575 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6575/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6576 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6576/"
}
],
"title": "Security update for opera",
"tracking": {
"current_release_date": "2020-10-23T10:27:55Z",
"generator": {
"date": "2020-10-23T10:27:55Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2020:1713-1",
"initial_release_date": "2020-10-23T10:27:55Z",
"revision_history": [
{
"date": "2020-10-23T10:27:55Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "opera-71.0.3770.228-lp152.2.18.1.x86_64",
"product": {
"name": "opera-71.0.3770.228-lp152.2.18.1.x86_64",
"product_id": "opera-71.0.3770.228-lp152.2.18.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.1 NonFree",
"product": {
"name": "openSUSE Leap 15.1 NonFree",
"product_id": "openSUSE Leap 15.1 NonFree",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.1"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.2 NonFree",
"product": {
"name": "openSUSE Leap 15.2 NonFree",
"product_id": "openSUSE Leap 15.2 NonFree",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "opera-71.0.3770.228-lp152.2.18.1.x86_64 as component of openSUSE Leap 15.1 NonFree",
"product_id": "openSUSE Leap 15.1 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64"
},
"product_reference": "opera-71.0.3770.228-lp152.2.18.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1 NonFree"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "opera-71.0.3770.228-lp152.2.18.1.x86_64 as component of openSUSE Leap 15.2 NonFree",
"product_id": "openSUSE Leap 15.2 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64"
},
"product_reference": "opera-71.0.3770.228-lp152.2.18.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2 NonFree"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-15959",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-15959"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in networking in Google Chrome prior to 85.0.4183.102 allowed an attacker who convinced the user to enable logging to obtain potentially sensitive information from process memory via social engineering.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64",
"openSUSE Leap 15.2 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-15959",
"url": "https://www.suse.com/security/cve/CVE-2020-15959"
},
{
"category": "external",
"summary": "SUSE Bug 1176306 for CVE-2020-15959",
"url": "https://bugzilla.suse.com/1176306"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64",
"openSUSE Leap 15.2 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64",
"openSUSE Leap 15.2 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-10-23T10:27:55Z",
"details": "critical"
}
],
"title": "CVE-2020-15959"
},
{
"cve": "CVE-2020-15960",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-15960"
}
],
"notes": [
{
"category": "general",
"text": "Heap buffer overflow in storage in Google Chrome prior to 85.0.4183.121 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64",
"openSUSE Leap 15.2 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-15960",
"url": "https://www.suse.com/security/cve/CVE-2020-15960"
},
{
"category": "external",
"summary": "SUSE Bug 1176791 for CVE-2020-15960",
"url": "https://bugzilla.suse.com/1176791"
},
{
"category": "external",
"summary": "SUSE Bug 1176799 for CVE-2020-15960",
"url": "https://bugzilla.suse.com/1176799"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64",
"openSUSE Leap 15.2 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64",
"openSUSE Leap 15.2 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-10-23T10:27:55Z",
"details": "critical"
}
],
"title": "CVE-2020-15960"
},
{
"cve": "CVE-2020-15961",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-15961"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy validation in extensions in Google Chrome prior to 85.0.4183.121 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64",
"openSUSE Leap 15.2 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-15961",
"url": "https://www.suse.com/security/cve/CVE-2020-15961"
},
{
"category": "external",
"summary": "SUSE Bug 1176791 for CVE-2020-15961",
"url": "https://bugzilla.suse.com/1176791"
},
{
"category": "external",
"summary": "SUSE Bug 1176799 for CVE-2020-15961",
"url": "https://bugzilla.suse.com/1176799"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64",
"openSUSE Leap 15.2 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64",
"openSUSE Leap 15.2 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-10-23T10:27:55Z",
"details": "critical"
}
],
"title": "CVE-2020-15961"
},
{
"cve": "CVE-2020-15962",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-15962"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy validation in serial in Google Chrome prior to 85.0.4183.121 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64",
"openSUSE Leap 15.2 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-15962",
"url": "https://www.suse.com/security/cve/CVE-2020-15962"
},
{
"category": "external",
"summary": "SUSE Bug 1176791 for CVE-2020-15962",
"url": "https://bugzilla.suse.com/1176791"
},
{
"category": "external",
"summary": "SUSE Bug 1176799 for CVE-2020-15962",
"url": "https://bugzilla.suse.com/1176799"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64",
"openSUSE Leap 15.2 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64",
"openSUSE Leap 15.2 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-10-23T10:27:55Z",
"details": "critical"
}
],
"title": "CVE-2020-15962"
},
{
"cve": "CVE-2020-15963",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-15963"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in extensions in Google Chrome prior to 85.0.4183.121 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64",
"openSUSE Leap 15.2 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-15963",
"url": "https://www.suse.com/security/cve/CVE-2020-15963"
},
{
"category": "external",
"summary": "SUSE Bug 1176791 for CVE-2020-15963",
"url": "https://bugzilla.suse.com/1176791"
},
{
"category": "external",
"summary": "SUSE Bug 1176799 for CVE-2020-15963",
"url": "https://bugzilla.suse.com/1176799"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64",
"openSUSE Leap 15.2 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64",
"openSUSE Leap 15.2 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-10-23T10:27:55Z",
"details": "critical"
}
],
"title": "CVE-2020-15963"
},
{
"cve": "CVE-2020-15964",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-15964"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient data validation in media in Google Chrome prior to 85.0.4183.121 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64",
"openSUSE Leap 15.2 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-15964",
"url": "https://www.suse.com/security/cve/CVE-2020-15964"
},
{
"category": "external",
"summary": "SUSE Bug 1176791 for CVE-2020-15964",
"url": "https://bugzilla.suse.com/1176791"
},
{
"category": "external",
"summary": "SUSE Bug 1176799 for CVE-2020-15964",
"url": "https://bugzilla.suse.com/1176799"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64",
"openSUSE Leap 15.2 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64",
"openSUSE Leap 15.2 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-10-23T10:27:55Z",
"details": "critical"
}
],
"title": "CVE-2020-15964"
},
{
"cve": "CVE-2020-15965",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-15965"
}
],
"notes": [
{
"category": "general",
"text": "Type confusion in V8 in Google Chrome prior to 85.0.4183.121 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64",
"openSUSE Leap 15.2 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-15965",
"url": "https://www.suse.com/security/cve/CVE-2020-15965"
},
{
"category": "external",
"summary": "SUSE Bug 1176791 for CVE-2020-15965",
"url": "https://bugzilla.suse.com/1176791"
},
{
"category": "external",
"summary": "SUSE Bug 1176799 for CVE-2020-15965",
"url": "https://bugzilla.suse.com/1176799"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64",
"openSUSE Leap 15.2 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64",
"openSUSE Leap 15.2 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-10-23T10:27:55Z",
"details": "critical"
}
],
"title": "CVE-2020-15965"
},
{
"cve": "CVE-2020-15966",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-15966"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in extensions in Google Chrome prior to 85.0.4183.121 allowed an attacker who convinced a user to install a malicious extension to obtain potentially sensitive information via a crafted Chrome Extension.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64",
"openSUSE Leap 15.2 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-15966",
"url": "https://www.suse.com/security/cve/CVE-2020-15966"
},
{
"category": "external",
"summary": "SUSE Bug 1176791 for CVE-2020-15966",
"url": "https://bugzilla.suse.com/1176791"
},
{
"category": "external",
"summary": "SUSE Bug 1176799 for CVE-2020-15966",
"url": "https://bugzilla.suse.com/1176799"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64",
"openSUSE Leap 15.2 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64",
"openSUSE Leap 15.2 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-10-23T10:27:55Z",
"details": "critical"
}
],
"title": "CVE-2020-15966"
},
{
"cve": "CVE-2020-6556",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6556"
}
],
"notes": [
{
"category": "general",
"text": "Heap buffer overflow in SwiftShader in Google Chrome prior to 84.0.4147.135 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64",
"openSUSE Leap 15.2 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6556",
"url": "https://www.suse.com/security/cve/CVE-2020-6556"
},
{
"category": "external",
"summary": "SUSE Bug 1175505 for CVE-2020-6556",
"url": "https://bugzilla.suse.com/1175505"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64",
"openSUSE Leap 15.2 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64",
"openSUSE Leap 15.2 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-10-23T10:27:55Z",
"details": "critical"
}
],
"title": "CVE-2020-6556"
},
{
"cve": "CVE-2020-6573",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6573"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in video in Google Chrome on Android prior to 85.0.4183.102 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64",
"openSUSE Leap 15.2 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6573",
"url": "https://www.suse.com/security/cve/CVE-2020-6573"
},
{
"category": "external",
"summary": "SUSE Bug 1176306 for CVE-2020-6573",
"url": "https://bugzilla.suse.com/1176306"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64",
"openSUSE Leap 15.2 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64",
"openSUSE Leap 15.2 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-10-23T10:27:55Z",
"details": "critical"
}
],
"title": "CVE-2020-6573"
},
{
"cve": "CVE-2020-6574",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6574"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in installer in Google Chrome on OS X prior to 85.0.4183.102 allowed a local attacker to potentially achieve privilege escalation via a crafted binary.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64",
"openSUSE Leap 15.2 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6574",
"url": "https://www.suse.com/security/cve/CVE-2020-6574"
},
{
"category": "external",
"summary": "SUSE Bug 1176306 for CVE-2020-6574",
"url": "https://bugzilla.suse.com/1176306"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64",
"openSUSE Leap 15.2 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64",
"openSUSE Leap 15.2 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-10-23T10:27:55Z",
"details": "critical"
}
],
"title": "CVE-2020-6574"
},
{
"cve": "CVE-2020-6575",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6575"
}
],
"notes": [
{
"category": "general",
"text": "Race in Mojo in Google Chrome prior to 85.0.4183.102 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64",
"openSUSE Leap 15.2 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6575",
"url": "https://www.suse.com/security/cve/CVE-2020-6575"
},
{
"category": "external",
"summary": "SUSE Bug 1176306 for CVE-2020-6575",
"url": "https://bugzilla.suse.com/1176306"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64",
"openSUSE Leap 15.2 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64",
"openSUSE Leap 15.2 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-10-23T10:27:55Z",
"details": "critical"
}
],
"title": "CVE-2020-6575"
},
{
"cve": "CVE-2020-6576",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6576"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in offscreen canvas in Google Chrome prior to 85.0.4183.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64",
"openSUSE Leap 15.2 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6576",
"url": "https://www.suse.com/security/cve/CVE-2020-6576"
},
{
"category": "external",
"summary": "SUSE Bug 1176306 for CVE-2020-6576",
"url": "https://bugzilla.suse.com/1176306"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64",
"openSUSE Leap 15.2 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64",
"openSUSE Leap 15.2 NonFree:opera-71.0.3770.228-lp152.2.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-10-23T10:27:55Z",
"details": "critical"
}
],
"title": "CVE-2020-6576"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.