1127 lines
59 KiB
JSON
1127 lines
59 KiB
JSON
{
|
||
"Definition": [
|
||
{
|
||
"ID": "oval:org.altlinux.errata:def:20201765",
|
||
"Version": "oval:org.altlinux.errata:def:20201765",
|
||
"Class": "patch",
|
||
"Metadata": {
|
||
"Title": "ALT-PU-2020-1765: package `chromium` update to version 81.0.4044.92-alt1",
|
||
"AffectedList": [
|
||
{
|
||
"Family": "unix",
|
||
"Platforms": [
|
||
"ALT Linux branch p9"
|
||
],
|
||
"Products": [
|
||
"ALT Server",
|
||
"ALT Virtualization Server",
|
||
"ALT Workstation",
|
||
"ALT Workstation K",
|
||
"ALT Education",
|
||
"Simply Linux",
|
||
"Starterkit"
|
||
]
|
||
}
|
||
],
|
||
"References": [
|
||
{
|
||
"RefID": "ALT-PU-2020-1765",
|
||
"RefURL": "https://errata.altlinux.org/ALT-PU-2020-1765",
|
||
"Source": "ALTPU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01912",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01912",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01914",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01914",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01915",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01915",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01916",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01916",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01917",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01917",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01918",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01918",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01919",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01919",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01961",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01961",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01962",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01962",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03666",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03666",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03667",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03667",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03668",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03668",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03669",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03669",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03670",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03670",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03674",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03674",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03675",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03675",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03715",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03715",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03716",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03716",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03717",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03717",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03718",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03718",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03719",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03719",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03720",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03720",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03721",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03721",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03722",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03722",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03723",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03723",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03736",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03736",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03737",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03737",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03738",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03738",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03739",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03739",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03740",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03740",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03741",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03741",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03742",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03742",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03743",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03743",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-04927",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-04927",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-04937",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-04937",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-06414",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-06414",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6419",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6419",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6422",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6422",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6423",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6423",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6424",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6424",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6425",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6425",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6426",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6426",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6427",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6427",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6428",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6428",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6429",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6429",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6430",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6430",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6431",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6431",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6432",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6432",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6433",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6433",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6434",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6434",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6435",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6435",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6436",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6436",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6437",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6437",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6438",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6438",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6439",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6439",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6440",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6440",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6441",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6441",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6442",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6442",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6443",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6443",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6444",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6444",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6445",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6445",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6446",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6446",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6447",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6447",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6448",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6448",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6449",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6449",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6450",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6450",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6451",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6451",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6452",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6452",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6453",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6453",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6454",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6454",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6455",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6455",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6456",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6456",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6572",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6572",
|
||
"Source": "CVE"
|
||
}
|
||
],
|
||
"Description": "This update upgrades chromium to version 81.0.4044.92-alt1. \nSecurity Fix(es):\n\n * BDU:2020-01912: Уязвимость компонента WebAudio браузера Google Chrome, связанная с использованием области памяти после её освобождения, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным, вызвать отказ в обслуживании или оказать воздействие на целостность данных\n\n * BDU:2020-01914: Уязвимость компонента аудио браузера Google Chrome, связанная с использованием памяти после ее освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-01915: Уязвимость компонента аудио браузера Google Chrome, связанная с использованием памяти после ее освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-01916: Уязвимость компонента аудио браузера Google Chrome, связанная с использованием памяти после ее освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-01917: Уязвимость компонента аудио браузера Google Chrome, связанная с использованием памяти после ее освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-01918: Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-01919: Уязвимость браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность\n\n * BDU:2020-01961: Уязвимость компонента мультимедиа браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-01962: Уязвимость браузера Google Chrome, связанная с использованием памяти после ее освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03666: Уязвимость компонента Audio браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03667: Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03668: Уязвимость полноэкранного режима браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-03669: Уязвимость компонента WebAudio браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-03670: Уязвимость компонента Media браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-03674: Уязвимость пользовательского интерфейса Chromium браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-03675: Уязвимость компонента devtools браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03715: Уязвимость пользовательского интерфейса Chromium браузера Google Chrome, связанная с ошибками применения правила в расширениях, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-03716: Уязвимость пользовательского интерфейса Chromium браузера Google Chrome, связанная с использованием области памяти после её освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03717: Уязвимость реализации WebView пользовательского интерфейса Chromium браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-03718: Уязвимость расширений браузера Google Chrome, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2020-03719: Уязвимость пользовательского интерфейса Chromium браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03720: Уязвимость расширений браузера Google Chrome, связанная с недостатком механизма контроля привилегий и средств управления доступом, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2020-03721: Уязвимость компонента Omnibox браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-03722: Уязвимость кэша приложения браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2020-03723: Уязвимость инструментов разработчика браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03736: Уязвимость модуля WebRTC браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03737: Уязвимость доверенных типов браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-03738: Уязвимость доверенных типов браузера Google Chrome, связанная с недостатком механизма стандартных разрешений, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-03739: Уязвимость инструментов разработчика браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03740: Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03741: Уязвимость расширений браузера Google Chrome, связанная с использованием области памяти после её освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03742: Уязвимость модуля WebSQL браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03743: Уязвимость браузера Google Chrome, связанная с недостатком механизма стандартных разрешений, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2021-04927: Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2021-04937: Уязвимость компонента Media браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-06414: Уязвимость функции Navigation браузера Google Chrome, позволяющая нарушителю обойти существующие ограничения\n\n * CVE-2020-6419: Out of bounds write in V8 in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6422: Use after free in WebGL in Google Chrome prior to 80.0.3987.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6423: Use after free in audio in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6424: Use after free in media in Google Chrome prior to 80.0.3987.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6425: Insufficient policy enforcement in extensions in Google Chrome prior to 80.0.3987.149 allowed an attacker who convinced a user to install a malicious extension to bypass site isolation via a crafted Chrome Extension.\n\n * CVE-2020-6426: Inappropriate implementation in V8 in Google Chrome prior to 80.0.3987.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6427: Use after free in audio in Google Chrome prior to 80.0.3987.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6428: Use after free in audio in Google Chrome prior to 80.0.3987.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6429: Use after free in audio in Google Chrome prior to 80.0.3987.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6430: Type Confusion in V8 in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6431: Insufficient policy enforcement in full screen in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to spoof security UI via a crafted HTML page.\n\n * CVE-2020-6432: Insufficient policy enforcement in navigations in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.\n\n * CVE-2020-6433: Insufficient policy enforcement in extensions in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.\n\n * CVE-2020-6434: Use after free in devtools in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6435: Insufficient policy enforcement in extensions in Google Chrome prior to 81.0.4044.92 allowed a remote attacker who had compromised the renderer process to bypass navigation restrictions via a crafted HTML page.\n\n * CVE-2020-6436: Use after free in window management in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6437: Inappropriate implementation in WebView in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to spoof security UI via a crafted application.\n\n * CVE-2020-6438: Insufficient policy enforcement in extensions in Google Chrome prior to 81.0.4044.92 allowed an attacker who convinced a user to install a malicious extension to obtain potentially sensitive information from process memory via a crafted Chrome Extension.\n\n * CVE-2020-6439: Insufficient policy enforcement in navigations in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to bypass security UI via a crafted HTML page.\n\n * CVE-2020-6440: Inappropriate implementation in extensions in Google Chrome prior to 81.0.4044.92 allowed an attacker who convinced a user to install a malicious extension to obtain potentially sensitive information via a crafted Chrome Extension.\n\n * CVE-2020-6441: Insufficient policy enforcement in omnibox in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to bypass security UI via a crafted HTML page.\n\n * CVE-2020-6442: Inappropriate implementation in cache in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2020-6443: Insufficient data validation in developer tools in Google Chrome prior to 81.0.4044.92 allowed a remote attacker who had convinced the user to use devtools to execute arbitrary code via a crafted HTML page.\n\n * CVE-2020-6444: Uninitialized use in WebRTC in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6445: Insufficient policy enforcement in trusted types in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to bypass content security policy via a crafted HTML page.\n\n * CVE-2020-6446: Insufficient policy enforcement in trusted types in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to bypass content security policy via a crafted HTML page.\n\n * CVE-2020-6447: Inappropriate implementation in developer tools in Google Chrome prior to 81.0.4044.92 allowed a remote attacker who had convinced the user to use devtools to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6448: Use after free in V8 in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6449: Use after free in audio in Google Chrome prior to 80.0.3987.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6450: Use after free in WebAudio in Google Chrome prior to 80.0.3987.162 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6451: Use after free in WebAudio in Google Chrome prior to 80.0.3987.162 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6452: Heap buffer overflow in media in Google Chrome prior to 80.0.3987.162 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6453: Inappropriate implementation in V8 in Google Chrome prior to 80.0.3987.162 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6454: Use after free in extensions in Google Chrome prior to 81.0.4044.92 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension.\n\n * CVE-2020-6455: Out of bounds read in WebSQL in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6456: Insufficient validation of untrusted input in clipboard in Google Chrome prior to 81.0.4044.92 allowed a local attacker to bypass site isolation via crafted clipboard contents.\n\n * CVE-2020-6572: Use after free in Media in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to execute arbitrary code via a crafted HTML page.",
|
||
"Advisory": {
|
||
"From": "errata.altlinux.org",
|
||
"Severity": "High",
|
||
"Rights": "Copyright 2024 BaseALT Ltd.",
|
||
"Issued": {
|
||
"Date": "2020-04-16"
|
||
},
|
||
"Updated": {
|
||
"Date": "2020-04-16"
|
||
},
|
||
"bdu": [
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01912",
|
||
"Impact": "High",
|
||
"Public": "20200413",
|
||
"CveID": "BDU:2020-01912"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01914",
|
||
"Impact": "High",
|
||
"Public": "20200323",
|
||
"CveID": "BDU:2020-01914"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01915",
|
||
"Impact": "High",
|
||
"Public": "20200323",
|
||
"CveID": "BDU:2020-01915"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01916",
|
||
"Impact": "High",
|
||
"Public": "20200323",
|
||
"CveID": "BDU:2020-01916"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01917",
|
||
"Impact": "High",
|
||
"Public": "20200323",
|
||
"CveID": "BDU:2020-01917"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
|
||
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"Cwe": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01918",
|
||
"Impact": "Low",
|
||
"Public": "20200323",
|
||
"CveID": "BDU:2020-01918"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
|
||
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
|
||
"Cwe": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01919",
|
||
"Impact": "Low",
|
||
"Public": "20200323",
|
||
"CveID": "BDU:2020-01919"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01961",
|
||
"Impact": "High",
|
||
"Public": "20200323",
|
||
"CveID": "BDU:2020-01961"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01962",
|
||
"Impact": "High",
|
||
"Public": "20200323",
|
||
"CveID": "BDU:2020-01962"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03666",
|
||
"Impact": "High",
|
||
"Public": "20200413",
|
||
"CveID": "BDU:2020-03666"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-843",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03667",
|
||
"Impact": "High",
|
||
"Public": "20200413",
|
||
"CveID": "BDU:2020-03667"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"Cwe": "CWE-276",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03668",
|
||
"Impact": "Low",
|
||
"Public": "20200413",
|
||
"CveID": "BDU:2020-03668"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03669",
|
||
"Impact": "High",
|
||
"Public": "20200413",
|
||
"CveID": "BDU:2020-03669"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03670",
|
||
"Impact": "High",
|
||
"Public": "20200413",
|
||
"CveID": "BDU:2020-03670"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"Cwe": "CWE-264",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03674",
|
||
"Impact": "Low",
|
||
"Public": "20200413",
|
||
"CveID": "BDU:2020-03674"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03675",
|
||
"Impact": "High",
|
||
"Public": "20200413",
|
||
"CveID": "BDU:2020-03675"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"Cwe": "CWE-264",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03715",
|
||
"Impact": "Low",
|
||
"Public": "20200413",
|
||
"CveID": "BDU:2020-03715"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03716",
|
||
"Impact": "High",
|
||
"Public": "20200413",
|
||
"CveID": "BDU:2020-03716"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"Cwe": "CWE-399",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03717",
|
||
"Impact": "Low",
|
||
"Public": "20200413",
|
||
"CveID": "BDU:2020-03717"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||
"Cwe": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03718",
|
||
"Impact": "Low",
|
||
"Public": "20200413",
|
||
"CveID": "BDU:2020-03718"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-276",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03719",
|
||
"Impact": "High",
|
||
"Public": "20200413",
|
||
"CveID": "BDU:2020-03719"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||
"Cwe": "CWE-264",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03720",
|
||
"Impact": "Low",
|
||
"Public": "20200413",
|
||
"CveID": "BDU:2020-03720"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"Cwe": "CWE-276",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03721",
|
||
"Impact": "Low",
|
||
"Public": "20200413",
|
||
"CveID": "BDU:2020-03721"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||
"Cwe": "CWE-668",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03722",
|
||
"Impact": "Low",
|
||
"Public": "20200413",
|
||
"CveID": "BDU:2020-03722"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-345",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03723",
|
||
"Impact": "High",
|
||
"Public": "20200413",
|
||
"CveID": "BDU:2020-03723"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
|
||
"Cwe": "CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03736",
|
||
"Impact": "Low",
|
||
"Public": "20200413",
|
||
"CveID": "BDU:2020-03736"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
|
||
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"Cwe": "CWE-276",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03737",
|
||
"Impact": "Low",
|
||
"Public": "20200413",
|
||
"CveID": "BDU:2020-03737"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
|
||
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"Cwe": "CWE-276",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03738",
|
||
"Impact": "Low",
|
||
"Public": "20200413",
|
||
"CveID": "BDU:2020-03738"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03739",
|
||
"Impact": "High",
|
||
"Public": "20200413",
|
||
"CveID": "BDU:2020-03739"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03740",
|
||
"Impact": "High",
|
||
"Public": "20200413",
|
||
"CveID": "BDU:2020-03740"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03741",
|
||
"Impact": "High",
|
||
"Public": "20200413",
|
||
"CveID": "BDU:2020-03741"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03742",
|
||
"Impact": "High",
|
||
"Public": "20200413",
|
||
"CveID": "BDU:2020-03742"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
|
||
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"Cwe": "CWE-276",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03743",
|
||
"Impact": "Low",
|
||
"Public": "20200413",
|
||
"CveID": "BDU:2020-03743"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-04927",
|
||
"Impact": "High",
|
||
"Public": "20200331",
|
||
"CveID": "BDU:2021-04927"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-04937",
|
||
"Impact": "High",
|
||
"Public": "20200407",
|
||
"CveID": "BDU:2021-04937"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"Cwe": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-06414",
|
||
"Impact": "Low",
|
||
"Public": "20200413",
|
||
"CveID": "BDU:2021-06414"
|
||
}
|
||
],
|
||
"Cves": [
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6419",
|
||
"Impact": "High",
|
||
"Public": "20200603",
|
||
"CveID": "CVE-2020-6419"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6422",
|
||
"Impact": "High",
|
||
"Public": "20200323",
|
||
"CveID": "CVE-2020-6422"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6423",
|
||
"Impact": "High",
|
||
"Public": "20200413",
|
||
"CveID": "CVE-2020-6423"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6424",
|
||
"Impact": "High",
|
||
"Public": "20200323",
|
||
"CveID": "CVE-2020-6424"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
|
||
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
|
||
"Cwe": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6425",
|
||
"Impact": "Low",
|
||
"Public": "20200323",
|
||
"CveID": "CVE-2020-6425"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"Cwe": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6426",
|
||
"Impact": "Low",
|
||
"Public": "20200323",
|
||
"CveID": "CVE-2020-6426"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6427",
|
||
"Impact": "High",
|
||
"Public": "20200323",
|
||
"CveID": "CVE-2020-6427"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6428",
|
||
"Impact": "High",
|
||
"Public": "20200323",
|
||
"CveID": "CVE-2020-6428"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6429",
|
||
"Impact": "High",
|
||
"Public": "20200323",
|
||
"CveID": "CVE-2020-6429"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-843",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6430",
|
||
"Impact": "High",
|
||
"Public": "20200413",
|
||
"CveID": "CVE-2020-6430"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"Cwe": "CWE-276",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6431",
|
||
"Impact": "Low",
|
||
"Public": "20200413",
|
||
"CveID": "CVE-2020-6431"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"Cwe": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6432",
|
||
"Impact": "Low",
|
||
"Public": "20200413",
|
||
"CveID": "CVE-2020-6432"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"Cwe": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6433",
|
||
"Impact": "Low",
|
||
"Public": "20200413",
|
||
"CveID": "CVE-2020-6433"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6434",
|
||
"Impact": "High",
|
||
"Public": "20200413",
|
||
"CveID": "CVE-2020-6434"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"Cwe": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6435",
|
||
"Impact": "Low",
|
||
"Public": "20200413",
|
||
"CveID": "CVE-2020-6435"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6436",
|
||
"Impact": "High",
|
||
"Public": "20200413",
|
||
"CveID": "CVE-2020-6436"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"Cwe": "NVD-CWE-Other",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6437",
|
||
"Impact": "Low",
|
||
"Public": "20200413",
|
||
"CveID": "CVE-2020-6437"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||
"Cwe": "CWE-209",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6438",
|
||
"Impact": "Low",
|
||
"Public": "20200413",
|
||
"CveID": "CVE-2020-6438"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-276",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6439",
|
||
"Impact": "High",
|
||
"Public": "20200413",
|
||
"CveID": "CVE-2020-6439"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||
"Cwe": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6440",
|
||
"Impact": "Low",
|
||
"Public": "20200413",
|
||
"CveID": "CVE-2020-6440"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"Cwe": "CWE-276",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6441",
|
||
"Impact": "Low",
|
||
"Public": "20200413",
|
||
"CveID": "CVE-2020-6441"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||
"Cwe": "CWE-668",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6442",
|
||
"Impact": "Low",
|
||
"Public": "20200413",
|
||
"CveID": "CVE-2020-6442"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-345",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6443",
|
||
"Impact": "High",
|
||
"Public": "20200413",
|
||
"CveID": "CVE-2020-6443"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
|
||
"Cwe": "CWE-908",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6444",
|
||
"Impact": "Low",
|
||
"Public": "20200413",
|
||
"CveID": "CVE-2020-6444"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"Cwe": "CWE-276",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6445",
|
||
"Impact": "Low",
|
||
"Public": "20200413",
|
||
"CveID": "CVE-2020-6445"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"Cwe": "CWE-276",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6446",
|
||
"Impact": "Low",
|
||
"Public": "20200413",
|
||
"CveID": "CVE-2020-6446"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6447",
|
||
"Impact": "High",
|
||
"Public": "20200413",
|
||
"CveID": "CVE-2020-6447"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6448",
|
||
"Impact": "High",
|
||
"Public": "20200413",
|
||
"CveID": "CVE-2020-6448"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6449",
|
||
"Impact": "High",
|
||
"Public": "20200323",
|
||
"CveID": "CVE-2020-6449"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6450",
|
||
"Impact": "High",
|
||
"Public": "20200413",
|
||
"CveID": "CVE-2020-6450"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6451",
|
||
"Impact": "High",
|
||
"Public": "20200413",
|
||
"CveID": "CVE-2020-6451"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6452",
|
||
"Impact": "High",
|
||
"Public": "20200413",
|
||
"CveID": "CVE-2020-6452"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6453",
|
||
"Impact": "High",
|
||
"Public": "20200603",
|
||
"CveID": "CVE-2020-6453"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6454",
|
||
"Impact": "High",
|
||
"Public": "20200413",
|
||
"CveID": "CVE-2020-6454"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6455",
|
||
"Impact": "High",
|
||
"Public": "20200413",
|
||
"CveID": "CVE-2020-6455"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"Cwe": "CWE-276",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6456",
|
||
"Impact": "Low",
|
||
"Public": "20200413",
|
||
"CveID": "CVE-2020-6456"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6572",
|
||
"Impact": "High",
|
||
"Public": "20210114",
|
||
"CveID": "CVE-2020-6572"
|
||
}
|
||
],
|
||
"AffectedCpeList": {
|
||
"Cpe": [
|
||
"cpe:/o:alt:kworkstation:9",
|
||
"cpe:/o:alt:workstation:9",
|
||
"cpe:/o:alt:server:9",
|
||
"cpe:/o:alt:server-v:9",
|
||
"cpe:/o:alt:education:9",
|
||
"cpe:/o:alt:slinux:9",
|
||
"cpe:/o:alt:starterkit:p9",
|
||
"cpe:/o:alt:kworkstation:9.1",
|
||
"cpe:/o:alt:workstation:9.1",
|
||
"cpe:/o:alt:server:9.1",
|
||
"cpe:/o:alt:server-v:9.1",
|
||
"cpe:/o:alt:education:9.1",
|
||
"cpe:/o:alt:slinux:9.1",
|
||
"cpe:/o:alt:starterkit:9.1",
|
||
"cpe:/o:alt:kworkstation:9.2",
|
||
"cpe:/o:alt:workstation:9.2",
|
||
"cpe:/o:alt:server:9.2",
|
||
"cpe:/o:alt:server-v:9.2",
|
||
"cpe:/o:alt:education:9.2",
|
||
"cpe:/o:alt:slinux:9.2",
|
||
"cpe:/o:alt:starterkit:9.2"
|
||
]
|
||
}
|
||
}
|
||
},
|
||
"Criteria": {
|
||
"Operator": "AND",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:1001",
|
||
"Comment": "ALT Linux must be installed"
|
||
}
|
||
],
|
||
"Criterias": [
|
||
{
|
||
"Operator": "OR",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20201765001",
|
||
"Comment": "chromium is earlier than 0:81.0.4044.92-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20201765002",
|
||
"Comment": "chromium-gnome is earlier than 0:81.0.4044.92-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20201765003",
|
||
"Comment": "chromium-kde is earlier than 0:81.0.4044.92-alt1"
|
||
}
|
||
]
|
||
}
|
||
]
|
||
}
|
||
}
|
||
]
|
||
} |