2024-06-28 13:17:52 +00:00

722 lines
36 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20202743",
"Version": "oval:org.altlinux.errata:def:20202743",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2020-2743: package `chromium` update to version 85.0.4183.83-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c10f1"
],
"Products": [
"ALT SP Workstation",
"ALT SP Server"
]
}
],
"References": [
{
"RefID": "ALT-PU-2020-2743",
"RefURL": "https://errata.altlinux.org/ALT-PU-2020-2743",
"Source": "ALTPU"
},
{
"RefID": "BDU:2021-01431",
"RefURL": "https://bdu.fstec.ru/vul/2021-01431",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01432",
"RefURL": "https://bdu.fstec.ru/vul/2021-01432",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01484",
"RefURL": "https://bdu.fstec.ru/vul/2021-01484",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01499",
"RefURL": "https://bdu.fstec.ru/vul/2021-01499",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01500",
"RefURL": "https://bdu.fstec.ru/vul/2021-01500",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01501",
"RefURL": "https://bdu.fstec.ru/vul/2021-01501",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01502",
"RefURL": "https://bdu.fstec.ru/vul/2021-01502",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01705",
"RefURL": "https://bdu.fstec.ru/vul/2021-01705",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01706",
"RefURL": "https://bdu.fstec.ru/vul/2021-01706",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01707",
"RefURL": "https://bdu.fstec.ru/vul/2021-01707",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01708",
"RefURL": "https://bdu.fstec.ru/vul/2021-01708",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01709",
"RefURL": "https://bdu.fstec.ru/vul/2021-01709",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01710",
"RefURL": "https://bdu.fstec.ru/vul/2021-01710",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01711",
"RefURL": "https://bdu.fstec.ru/vul/2021-01711",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01712",
"RefURL": "https://bdu.fstec.ru/vul/2021-01712",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01713",
"RefURL": "https://bdu.fstec.ru/vul/2021-01713",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01714",
"RefURL": "https://bdu.fstec.ru/vul/2021-01714",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01715",
"RefURL": "https://bdu.fstec.ru/vul/2021-01715",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01756",
"RefURL": "https://bdu.fstec.ru/vul/2021-01756",
"Source": "BDU"
},
{
"RefID": "CVE-2020-6542",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6542",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6543",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6543",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6544",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6544",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6545",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6545",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6546",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6546",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6547",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6547",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6548",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6548",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6549",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6549",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6550",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6550",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6551",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6551",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6552",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6552",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6554",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6554",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6555",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6555",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6556",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6556",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6558",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6558",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6559",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6559",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6560",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6560",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6561",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6561",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6562",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6562",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6563",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6563",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6564",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6564",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6565",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6565",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6566",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6566",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6567",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6567",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6568",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6568",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6569",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6569",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6570",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6570",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6571",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6571",
"Source": "CVE"
}
],
"Description": "This update upgrades chromium to version 85.0.4183.83-alt1. \nSecurity Fix(es):\n\n * BDU:2021-01431: Уязвимость компонента audio браузера Google Chrome, связанная с использованием области памяти после её освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2021-01432: Уязвимость компонента media браузера Google Chrome, связанная с использованием области памяти после её освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2021-01484: Уязвимость компонента WebXR браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2021-01499: Уязвимость компонента scheduling браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2021-01500: Уязвимость компонента IndexedDB браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2021-01501: Уязвимость компонента media браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2021-01502: Уязвимость компонента media браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2021-01705: Уязвимость адресной строки Omnibox браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2021-01706: Уязвимость стандарта передачи данных WebRTC браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2021-01707: Уязвимость компонента WebUSB браузера Google Chrome, связанная с целочисленным переполнением значения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2021-01708: Уязвимость компонента media браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2021-01709: Уязвимость компонента «Разрешения» браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2021-01710: Уязвимость компонента Content Security Policy браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2021-01711: Уязвимость функции Автозаполнения браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2021-01712: Уязвимость компонента presentation API браузера Google Chrome, связанная с использованием области памяти после её освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2021-01713: Уязвимость компонента SwiftShader браузера Google Chrome, связанная с выходом операции за допустимые границы буфера данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2021-01714: Уязвимость расширений браузера Google Chrome, связанная с использованием области памяти после её освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2021-01715: Уязвимость механизма отображения веб-страниц Blink браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2021-01756: Уязвимость модуля отображения Blink браузера Google Chrome, связанная с неправильным присвоением разрешений для критичного ресурса, позволяющая нарушителю оказать воздействие на целостность данных\n\n * CVE-2020-6542: Use after free in ANGLE in Google Chrome prior to 84.0.4147.125 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6543: Use after free in task scheduling in Google Chrome prior to 84.0.4147.125 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6544: Use after free in media in Google Chrome prior to 84.0.4147.125 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6545: Use after free in audio in Google Chrome prior to 84.0.4147.125 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6546: Inappropriate implementation in installer in Google Chrome prior to 84.0.4147.125 allowed a local attacker to potentially elevate privilege via a crafted filesystem.\n\n * CVE-2020-6547: Incorrect security UI in media in Google Chrome prior to 84.0.4147.125 allowed a remote attacker to potentially obtain sensitive information via a crafted HTML page.\n\n * CVE-2020-6548: Heap buffer overflow in Skia in Google Chrome prior to 84.0.4147.125 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6549: Use after free in media in Google Chrome prior to 84.0.4147.125 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6550: Use after free in IndexedDB in Google Chrome prior to 84.0.4147.125 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6551: Use after free in WebXR in Google Chrome prior to 84.0.4147.125 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6552: Use after free in Blink in Google Chrome prior to 84.0.4147.125 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6554: Use after free in extensions in Google Chrome prior to 84.0.4147.125 allowed a remote attacker to potentially perform a sandbox escape via a crafted Chrome Extension.\n\n * CVE-2020-6555: Out of bounds read in WebGL in Google Chrome prior to 84.0.4147.125 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.\n\n * CVE-2020-6556: Heap buffer overflow in SwiftShader in Google Chrome prior to 84.0.4147.135 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6558: Insufficient policy enforcement in iOSWeb in Google Chrome on iOS prior to 85.0.4183.83 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.\n\n * CVE-2020-6559: Use after free in presentation API in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6560: Insufficient policy enforcement in autofill in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2020-6561: Inappropriate implementation in Content Security Policy in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2020-6562: Insufficient policy enforcement in Blink in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2020-6563: Insufficient policy enforcement in intent handling in Google Chrome on Android prior to 85.0.4183.83 allowed a remote attacker to obtain potentially sensitive information from disk via a crafted HTML page.\n\n * CVE-2020-6564: Inappropriate implementation in permissions in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to spoof the contents of a permission dialog via a crafted HTML page.\n\n * CVE-2020-6565: Inappropriate implementation in Omnibox in Google Chrome on iOS prior to 85.0.4183.83 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2020-6566: Insufficient policy enforcement in media in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2020-6567: Insufficient validation of untrusted input in command line handling in Google Chrome on Windows prior to 85.0.4183.83 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.\n\n * CVE-2020-6568: Insufficient policy enforcement in intent handling in Google Chrome on Android prior to 85.0.4183.83 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.\n\n * CVE-2020-6569: Integer overflow in WebUSB in Google Chrome prior to 85.0.4183.83 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6570: Information leakage in WebRTC in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to obtain potentially sensitive information via a crafted WebRTC interaction.\n\n * CVE-2020-6571: Insufficient data validation in Omnibox in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2020-09-08"
},
"Updated": {
"Date": "2020-09-08"
},
"BDUs": [
{
"ID": "BDU:2021-01431",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-01431",
"Impact": "Low",
"Public": "20200921"
},
{
"ID": "BDU:2021-01432",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-01432",
"Impact": "Critical",
"Public": "20200921"
},
{
"ID": "BDU:2021-01484",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-01484",
"Impact": "Critical",
"Public": "20200921"
},
{
"ID": "BDU:2021-01499",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-01499",
"Impact": "Low",
"Public": "20200921"
},
{
"ID": "BDU:2021-01500",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-01500",
"Impact": "Critical",
"Public": "20200921"
},
{
"ID": "BDU:2021-01501",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2021-01501",
"Impact": "Low",
"Public": "20200921"
},
{
"ID": "BDU:2021-01502",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-01502",
"Impact": "Low",
"Public": "20200921"
},
{
"ID": "BDU:2021-01705",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-01705",
"Impact": "Low",
"Public": "20200921"
},
{
"ID": "BDU:2021-01706",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2021-01706",
"Impact": "Low",
"Public": "20200921"
},
{
"ID": "BDU:2021-01707",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "CWE-190",
"Href": "https://bdu.fstec.ru/vul/2021-01707",
"Impact": "Low",
"Public": "20200921"
},
{
"ID": "BDU:2021-01708",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2021-01708",
"Impact": "Low",
"Public": "20200921"
},
{
"ID": "BDU:2021-01709",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CWE": "CWE-281",
"Href": "https://bdu.fstec.ru/vul/2021-01709",
"Impact": "Low",
"Public": "20200921"
},
{
"ID": "BDU:2021-01710",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CWE": "CWE-358",
"Href": "https://bdu.fstec.ru/vul/2021-01710",
"Impact": "Low",
"Public": "20200921"
},
{
"ID": "BDU:2021-01711",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2021-01711",
"Impact": "Low",
"Public": "20200921"
},
{
"ID": "BDU:2021-01712",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-01712",
"Impact": "Critical",
"Public": "20200921"
},
{
"ID": "BDU:2021-01713",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2021-01713",
"Impact": "Critical",
"Public": "20200921"
},
{
"ID": "BDU:2021-01714",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-01714",
"Impact": "High",
"Public": "20200921"
},
{
"ID": "BDU:2021-01715",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-01715",
"Impact": "Critical",
"Public": "20200921"
},
{
"ID": "BDU:2021-01756",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CWE": "CWE-732",
"Href": "https://bdu.fstec.ru/vul/2021-01756",
"Impact": "Low",
"Public": "20200921"
}
],
"CVEs": [
{
"ID": "CVE-2020-6542",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6542",
"Impact": "High",
"Public": "20200921"
},
{
"ID": "CVE-2020-6543",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6543",
"Impact": "High",
"Public": "20200921"
},
{
"ID": "CVE-2020-6544",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6544",
"Impact": "High",
"Public": "20200921"
},
{
"ID": "CVE-2020-6545",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6545",
"Impact": "High",
"Public": "20200921"
},
{
"ID": "CVE-2020-6546",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-59",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6546",
"Impact": "High",
"Public": "20200921"
},
{
"ID": "CVE-2020-6547",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-1021",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6547",
"Impact": "Low",
"Public": "20200921"
},
{
"ID": "CVE-2020-6548",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6548",
"Impact": "High",
"Public": "20200921"
},
{
"ID": "CVE-2020-6549",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6549",
"Impact": "High",
"Public": "20200921"
},
{
"ID": "CVE-2020-6550",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6550",
"Impact": "High",
"Public": "20200921"
},
{
"ID": "CVE-2020-6551",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6551",
"Impact": "High",
"Public": "20200921"
},
{
"ID": "CVE-2020-6552",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6552",
"Impact": "High",
"Public": "20200921"
},
{
"ID": "CVE-2020-6554",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6554",
"Impact": "High",
"Public": "20200921"
},
{
"ID": "CVE-2020-6555",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6555",
"Impact": "High",
"Public": "20200921"
},
{
"ID": "CVE-2020-6556",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6556",
"Impact": "High",
"Public": "20200921"
},
{
"ID": "CVE-2020-6558",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6558",
"Impact": "Low",
"Public": "20200921"
},
{
"ID": "CVE-2020-6559",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6559",
"Impact": "High",
"Public": "20200921"
},
{
"ID": "CVE-2020-6560",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6560",
"Impact": "Low",
"Public": "20200921"
},
{
"ID": "CVE-2020-6561",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6561",
"Impact": "Low",
"Public": "20200921"
},
{
"ID": "CVE-2020-6562",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6562",
"Impact": "Low",
"Public": "20200921"
},
{
"ID": "CVE-2020-6563",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6563",
"Impact": "Low",
"Public": "20200921"
},
{
"ID": "CVE-2020-6564",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-281",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6564",
"Impact": "Low",
"Public": "20200921"
},
{
"ID": "CVE-2020-6565",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6565",
"Impact": "Low",
"Public": "20200921"
},
{
"ID": "CVE-2020-6566",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6566",
"Impact": "Low",
"Public": "20200921"
},
{
"ID": "CVE-2020-6567",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6567",
"Impact": "Low",
"Public": "20200921"
},
{
"ID": "CVE-2020-6568",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6568",
"Impact": "Low",
"Public": "20200921"
},
{
"ID": "CVE-2020-6569",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6569",
"Impact": "Low",
"Public": "20200921"
},
{
"ID": "CVE-2020-6570",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6570",
"Impact": "Low",
"Public": "20200921"
},
{
"ID": "CVE-2020-6571",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6571",
"Impact": "Low",
"Public": "20200921"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:10",
"cpe:/o:alt:spserver:10"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:4001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20202743001",
"Comment": "chromium is earlier than 0:85.0.4183.83-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202743002",
"Comment": "chromium-gnome is earlier than 0:85.0.4183.83-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202743003",
"Comment": "chromium-kde is earlier than 0:85.0.4183.83-alt1"
}
]
}
]
}
}
]
}