2024-06-28 13:17:52 +00:00

959 lines
49 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20202468",
"Version": "oval:org.altlinux.errata:def:20202468",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2020-2468: package `chromium` update to version 84.0.4147.89-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2020-2468",
"RefURL": "https://errata.altlinux.org/ALT-PU-2020-2468",
"Source": "ALTPU"
},
{
"RefID": "BDU:2020-04724",
"RefURL": "https://bdu.fstec.ru/vul/2020-04724",
"Source": "BDU"
},
{
"RefID": "BDU:2020-04725",
"RefURL": "https://bdu.fstec.ru/vul/2020-04725",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01461",
"RefURL": "https://bdu.fstec.ru/vul/2021-01461",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01463",
"RefURL": "https://bdu.fstec.ru/vul/2021-01463",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01464",
"RefURL": "https://bdu.fstec.ru/vul/2021-01464",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01465",
"RefURL": "https://bdu.fstec.ru/vul/2021-01465",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01466",
"RefURL": "https://bdu.fstec.ru/vul/2021-01466",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01467",
"RefURL": "https://bdu.fstec.ru/vul/2021-01467",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01468",
"RefURL": "https://bdu.fstec.ru/vul/2021-01468",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01469",
"RefURL": "https://bdu.fstec.ru/vul/2021-01469",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01470",
"RefURL": "https://bdu.fstec.ru/vul/2021-01470",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01471",
"RefURL": "https://bdu.fstec.ru/vul/2021-01471",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01504",
"RefURL": "https://bdu.fstec.ru/vul/2021-01504",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01505",
"RefURL": "https://bdu.fstec.ru/vul/2021-01505",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01506",
"RefURL": "https://bdu.fstec.ru/vul/2021-01506",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01507",
"RefURL": "https://bdu.fstec.ru/vul/2021-01507",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01508",
"RefURL": "https://bdu.fstec.ru/vul/2021-01508",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01509",
"RefURL": "https://bdu.fstec.ru/vul/2021-01509",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01510",
"RefURL": "https://bdu.fstec.ru/vul/2021-01510",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01511",
"RefURL": "https://bdu.fstec.ru/vul/2021-01511",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01512",
"RefURL": "https://bdu.fstec.ru/vul/2021-01512",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01513",
"RefURL": "https://bdu.fstec.ru/vul/2021-01513",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01514",
"RefURL": "https://bdu.fstec.ru/vul/2021-01514",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01749",
"RefURL": "https://bdu.fstec.ru/vul/2021-01749",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01752",
"RefURL": "https://bdu.fstec.ru/vul/2021-01752",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01753",
"RefURL": "https://bdu.fstec.ru/vul/2021-01753",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01754",
"RefURL": "https://bdu.fstec.ru/vul/2021-01754",
"Source": "BDU"
},
{
"RefID": "BDU:2021-03632",
"RefURL": "https://bdu.fstec.ru/vul/2021-03632",
"Source": "BDU"
},
{
"RefID": "BDU:2021-03633",
"RefURL": "https://bdu.fstec.ru/vul/2021-03633",
"Source": "BDU"
},
{
"RefID": "BDU:2021-03816",
"RefURL": "https://bdu.fstec.ru/vul/2021-03816",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00047",
"RefURL": "https://bdu.fstec.ru/vul/2022-00047",
"Source": "BDU"
},
{
"RefID": "CVE-2020-6492",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6492",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6493",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6493",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6495",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6495",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6505",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6505",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6507",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6507",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6509",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6509",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6510",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6510",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6511",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6511",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6512",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6512",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6513",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6513",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6514",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6514",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6515",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6515",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6516",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6516",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6517",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6517",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6518",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6518",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6519",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6519",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6520",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6520",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6521",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6521",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6522",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6522",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6523",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6523",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6524",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6524",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6525",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6525",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6526",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6526",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6527",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6527",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6528",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6528",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6529",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6529",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6530",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6530",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6531",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6531",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6533",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6533",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6534",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6534",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6535",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6535",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6536",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6536",
"Source": "CVE"
}
],
"Description": "This update upgrades chromium to version 84.0.4147.89-alt1. \nSecurity Fix(es):\n\n * BDU:2020-04724: Уязвимость инструментов разработчика браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность защищаемой информации\n\n * BDU:2020-04725: Уязвимость реализации WebAuthentication браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2021-01461: Уязвимость реализации технологии WebRTC браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2021-01463: Уязвимость инструментов разработчика браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2021-01464: Уязвимость реализации технологии WebRTC браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2021-01465: Уязвимость компонента Content Security Policy (CSP) браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2021-01466: Уязвимость графической библиотеки Skia браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2021-01467: Уязвимость компонента Skia браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2021-01468: Уязвимость функции Автозаполнения браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2021-01469: Уязвимость компонента CSP браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2021-01470: Уязвимость компонента history браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2021-01471: Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2021-01504: Уязвимость компонента PWAs браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2021-01505: Уязвимость пользовательского интерфейса WebUI браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2021-01506: Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2021-01507: Уязвимость реализации режима Scroll-To-Text браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2021-01508: Уязвимость изолированной среды iframe браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2021-01509: Уязвимость компонента WebAudio браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2021-01510: Уязвимость реализации external protocol браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2021-01511: Уязвимость графической библиотеки Skia браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2021-01512: Уязвимость компонента developer tools браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2021-01513: Уязвимость компонента Content Security Policy браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2021-01514: Уязвимость компонента background fetch браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2021-01749: Уязвимость реализация WebRTC веб-браузеров Google Chrome, Firefox, Firefox-ESR и почтового клиента Thunderbird, связанная с переполнением буфера кучи, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2021-01752: Уязвимость расширений браузера Google Chrome, связанная с использованием области памяти после её освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2021-01753: Уязвимость компонента speech браузера Google Chrome, связанная с использованием области памяти после её освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2021-01754: Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, связанная с записью за границами буфера, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2021-03632: Уязвимость веб-браузера Google Chrome, связанная с использованием памяти после её освобождения, позволяющая нарушителю получить доступ к конфиденциальной информации или вызвать отказ в обслуживании\n\n * BDU:2021-03633: Уязвимость реализации механизма CORS веб-браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальной информации\n\n * BDU:2021-03816: Уязвимость обработчика PDF-содержимого PDFium веб-браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-00047: Уязвимость пользовательского интерфейса базовой аутентификации браузера Google Chrome, позволяющая нарушителю подделать содержимое адресной строки с помощью специально созданной HTML страницы\n\n * CVE-2020-6492: Use after free in ANGLE in Google Chrome prior to 83.0.4103.97 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.\n\n * CVE-2020-6493: Use after free in WebAuthentication in Google Chrome prior to 83.0.4103.97 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.\n\n * CVE-2020-6495: Insufficient policy enforcement in developer tools in Google Chrome prior to 83.0.4103.97 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension.\n\n * CVE-2020-6505: Use after free in speech in Google Chrome prior to 83.0.4103.106 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.\n\n * CVE-2020-6507: Out of bounds write in V8 in Google Chrome prior to 83.0.4103.106 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6509: Use after free in extensions in Google Chrome prior to 83.0.4103.116 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension.\n\n * CVE-2020-6510: Heap buffer overflow in background fetch in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6511: Information leak in content security policy in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2020-6512: Type Confusion in V8 in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6513: Heap buffer overflow in PDFium in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.\n\n * CVE-2020-6514: Inappropriate implementation in WebRTC in Google Chrome prior to 84.0.4147.89 allowed an attacker in a privileged network position to potentially exploit heap corruption via a crafted SCTP stream.\n\n * CVE-2020-6515: Use after free in tab strip in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6516: Policy bypass in CORS in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2020-6517: Heap buffer overflow in history in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6518: Use after free in developer tools in Google Chrome prior to 84.0.4147.89 allowed a remote attacker who had convinced the user to use developer tools to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6519: Policy bypass in CSP in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to bypass content security policy via a crafted HTML page.\n\n * CVE-2020-6520: Buffer overflow in Skia in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6521: Side-channel information leakage in autofill in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.\n\n * CVE-2020-6522: Inappropriate implementation in external protocol handlers in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.\n\n * CVE-2020-6523: Out of bounds write in Skia in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6524: Heap buffer overflow in WebAudio in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6525: Heap buffer overflow in Skia in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6526: Inappropriate implementation in iframe sandbox in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.\n\n * CVE-2020-6527: Insufficient policy enforcement in CSP in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to bypass content security policy via a crafted HTML page.\n\n * CVE-2020-6528: Incorrect security UI in basic auth in Google Chrome on iOS prior to 84.0.4147.89 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2020-6529: Inappropriate implementation in WebRTC in Google Chrome prior to 84.0.4147.89 allowed an attacker in a privileged network position to leak cross-origin data via a crafted HTML page.\n\n * CVE-2020-6530: Out of bounds memory access in developer tools in Google Chrome prior to 84.0.4147.89 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension.\n\n * CVE-2020-6531: Side-channel information leakage in scroll to text in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2020-6533: Type Confusion in V8 in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6534: Heap buffer overflow in WebRTC in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6535: Insufficient data validation in WebUI in Google Chrome prior to 84.0.4147.89 allowed a remote attacker who had compromised the renderer process to inject scripts or HTML into a privileged page via a crafted HTML page.\n\n * CVE-2020-6536: Incorrect security UI in PWAs in Google Chrome prior to 84.0.4147.89 allowed a remote attacker who had persuaded the user to install a PWA to spoof the contents of the Omnibox (URL bar) via a crafted PWA.\n\n * #38716: Падает на сайтах с multimedia",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2020-07-29"
},
"Updated": {
"Date": "2020-07-29"
},
"BDUs": [
{
"ID": "BDU:2020-04724",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-276",
"Href": "https://bdu.fstec.ru/vul/2020-04724",
"Impact": "Low",
"Public": "20200603"
},
{
"ID": "BDU:2020-04725",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-04725",
"Impact": "High",
"Public": "20200603"
},
{
"ID": "BDU:2021-01461",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2021-01461",
"Impact": "Low",
"Public": "20200722"
},
{
"ID": "BDU:2021-01463",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2021-01463",
"Impact": "Low",
"Public": "20200722"
},
{
"ID": "BDU:2021-01464",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-01464",
"Impact": "Low",
"Public": "20200722"
},
{
"ID": "BDU:2021-01465",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CWE": "CWE-276",
"Href": "https://bdu.fstec.ru/vul/2021-01465",
"Impact": "Low",
"Public": "20200722"
},
{
"ID": "BDU:2021-01466",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2021-01466",
"Impact": "Low",
"Public": "20200722"
},
{
"ID": "BDU:2021-01467",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2021-01467",
"Impact": "High",
"Public": "20200722"
},
{
"ID": "BDU:2021-01468",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2021-01468",
"Impact": "Low",
"Public": "20200722"
},
{
"ID": "BDU:2021-01469",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-284",
"Href": "https://bdu.fstec.ru/vul/2021-01469",
"Impact": "Low",
"Public": "20200722"
},
{
"ID": "BDU:2021-01470",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2021-01470",
"Impact": "Critical",
"Public": "20200722"
},
{
"ID": "BDU:2021-01471",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-843",
"Href": "https://bdu.fstec.ru/vul/2021-01471",
"Impact": "Critical",
"Public": "20200722"
},
{
"ID": "BDU:2021-01504",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CWE": "CWE-358",
"Href": "https://bdu.fstec.ru/vul/2021-01504",
"Impact": "Low",
"Public": "20200722"
},
{
"ID": "BDU:2021-01505",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-01505",
"Impact": "Low",
"Public": "20200722"
},
{
"ID": "BDU:2021-01506",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "CWE-843",
"Href": "https://bdu.fstec.ru/vul/2021-01506",
"Impact": "Low",
"Public": "20200722"
},
{
"ID": "BDU:2021-01507",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CWE": "CWE-203",
"Href": "https://bdu.fstec.ru/vul/2021-01507",
"Impact": "Low",
"Public": "20200722"
},
{
"ID": "BDU:2021-01508",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CWE": "CWE-358",
"Href": "https://bdu.fstec.ru/vul/2021-01508",
"Impact": "Low",
"Public": "20200722"
},
{
"ID": "BDU:2021-01509",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2021-01509",
"Impact": "Critical",
"Public": "20200722"
},
{
"ID": "BDU:2021-01510",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"CWE": "CWE-358",
"Href": "https://bdu.fstec.ru/vul/2021-01510",
"Impact": "High",
"Public": "20200722"
},
{
"ID": "BDU:2021-01511",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-120",
"Href": "https://bdu.fstec.ru/vul/2021-01511",
"Impact": "Critical",
"Public": "20200722"
},
{
"ID": "BDU:2021-01512",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-01512",
"Impact": "Critical",
"Public": "20200722"
},
{
"ID": "BDU:2021-01513",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2021-01513",
"Impact": "Low",
"Public": "20200722"
},
{
"ID": "BDU:2021-01514",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2021-01514",
"Impact": "High",
"Public": "20200722"
},
{
"ID": "BDU:2021-01749",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-122",
"Href": "https://bdu.fstec.ru/vul/2021-01749",
"Impact": "Low",
"Public": "20200722"
},
{
"ID": "BDU:2021-01752",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-01752",
"Impact": "High",
"Public": "20200608"
},
{
"ID": "BDU:2021-01753",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-01753",
"Impact": "High",
"Public": "20200511"
},
{
"ID": "BDU:2021-01754",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2021-01754",
"Impact": "High",
"Public": "20200527"
},
{
"ID": "BDU:2021-03632",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-03632",
"Impact": "High",
"Public": "20200722"
},
{
"ID": "BDU:2021-03633",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-03633",
"Impact": "Low",
"Public": "20200722"
},
{
"ID": "BDU:2021-03816",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2021-03816",
"Impact": "High",
"Public": "20200722"
},
{
"ID": "BDU:2022-00047",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-451",
"Href": "https://bdu.fstec.ru/vul/2022-00047",
"Impact": "Low",
"Public": "20200722"
}
],
"CVEs": [
{
"ID": "CVE-2020-6492",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6492",
"Impact": "Critical",
"Public": "20211102"
},
{
"ID": "CVE-2020-6493",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6493",
"Impact": "Critical",
"Public": "20200603"
},
{
"ID": "CVE-2020-6495",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-276",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6495",
"Impact": "Low",
"Public": "20200603"
},
{
"ID": "CVE-2020-6505",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6505",
"Impact": "Critical",
"Public": "20200722"
},
{
"ID": "CVE-2020-6507",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6507",
"Impact": "High",
"Public": "20200722"
},
{
"ID": "CVE-2020-6509",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6509",
"Impact": "Critical",
"Public": "20200722"
},
{
"ID": "CVE-2020-6510",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6510",
"Impact": "High",
"Public": "20200722"
},
{
"ID": "CVE-2020-6511",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-209",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6511",
"Impact": "Low",
"Public": "20200722"
},
{
"ID": "CVE-2020-6512",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6512",
"Impact": "High",
"Public": "20200722"
},
{
"ID": "CVE-2020-6513",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6513",
"Impact": "High",
"Public": "20200722"
},
{
"ID": "CVE-2020-6514",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6514",
"Impact": "Low",
"Public": "20200722"
},
{
"ID": "CVE-2020-6515",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6515",
"Impact": "High",
"Public": "20200722"
},
{
"ID": "CVE-2020-6516",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6516",
"Impact": "Low",
"Public": "20200722"
},
{
"ID": "CVE-2020-6517",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6517",
"Impact": "High",
"Public": "20200722"
},
{
"ID": "CVE-2020-6518",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6518",
"Impact": "High",
"Public": "20200722"
},
{
"ID": "CVE-2020-6519",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6519",
"Impact": "Low",
"Public": "20200722"
},
{
"ID": "CVE-2020-6520",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6520",
"Impact": "High",
"Public": "20200722"
},
{
"ID": "CVE-2020-6521",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6521",
"Impact": "Low",
"Public": "20200722"
},
{
"ID": "CVE-2020-6522",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6522",
"Impact": "Critical",
"Public": "20200722"
},
{
"ID": "CVE-2020-6523",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6523",
"Impact": "High",
"Public": "20200722"
},
{
"ID": "CVE-2020-6524",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6524",
"Impact": "High",
"Public": "20200722"
},
{
"ID": "CVE-2020-6525",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6525",
"Impact": "High",
"Public": "20200722"
},
{
"ID": "CVE-2020-6526",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6526",
"Impact": "Low",
"Public": "20200722"
},
{
"ID": "CVE-2020-6527",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-276",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6527",
"Impact": "Low",
"Public": "20200722"
},
{
"ID": "CVE-2020-6528",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6528",
"Impact": "Low",
"Public": "20200722"
},
{
"ID": "CVE-2020-6529",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "CWE-295",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6529",
"Impact": "Low",
"Public": "20200722"
},
{
"ID": "CVE-2020-6530",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6530",
"Impact": "High",
"Public": "20200722"
},
{
"ID": "CVE-2020-6531",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "CWE-203",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6531",
"Impact": "Low",
"Public": "20200722"
},
{
"ID": "CVE-2020-6533",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6533",
"Impact": "High",
"Public": "20200722"
},
{
"ID": "CVE-2020-6534",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6534",
"Impact": "High",
"Public": "20200722"
},
{
"ID": "CVE-2020-6535",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6535",
"Impact": "Low",
"Public": "20200722"
},
{
"ID": "CVE-2020-6536",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6536",
"Impact": "Low",
"Public": "20200722"
}
],
"Bugzilla": [
{
"ID": "38716",
"Href": "https://bugzilla.altlinux.org/38716",
"Data": "Падает на сайтах с multimedia"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20202468001",
"Comment": "chromium is earlier than 0:84.0.4147.89-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202468002",
"Comment": "chromium-gnome is earlier than 0:84.0.4147.89-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202468003",
"Comment": "chromium-kde is earlier than 0:84.0.4147.89-alt1"
}
]
}
]
}
}
]
}