Lucene search

K
redhatRedHatRHSA-2020:3723
HistorySep 10, 2020 - 1:29 p.m.

(RHSA-2020:3723) Important: chromium-browser security update

2020-09-1013:29:04
access.redhat.com
28

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.032 Low

EPSS

Percentile

91.1%

Chromium is an open-source web browser, powered by WebKit (Blink).

This update upgrades Chromium to version 85.0.4183.83.

Security Fix(es):

  • chromium-browser: Use after free in presentation API (CVE-2020-6559)

  • chromium-browser: Incorrect security UI in Omnibox (CVE-2020-6571)

  • chromium-browser: Insufficient policy enforcement in autofill (CVE-2020-6560)

  • chromium-browser: Inappropriate implementation in Content Security Policy (CVE-2020-6561)

  • chromium-browser: Insufficient policy enforcement in Blink (CVE-2020-6562)

  • chromium-browser: Insufficient policy enforcement in intent handling (CVE-2020-6563)

  • chromium-browser: Incorrect security UI in permissions (CVE-2020-6564)

  • chromium-browser: Incorrect security UI in Omnibox (CVE-2020-6565)

  • chromium-browser: Insufficient policy enforcement in media (CVE-2020-6566)

  • chromium-browser: Insufficient validation of untrusted input in command line handling (CVE-2020-6567)

  • chromium-browser: Insufficient policy enforcement in intent handling (CVE-2020-6568)

  • chromium-browser: Integer overflow in WebUSB (CVE-2020-6569)

  • chromium-browser: Side-channel information leakage in WebRTC (CVE-2020-6570)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.032 Low

EPSS

Percentile

91.1%