Lucene search

K
suseSuseOPENSUSE-SU-2020:0210-1
HistoryFeb 12, 2020 - 12:00 a.m.

Security update for chromium (important)

2020-02-1200:00:00
lists.opensuse.org
44

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

An update that fixes 38 vulnerabilities is now available.

Description:

This update for chromium fixes the following issues:

Chromium was updated to version 80.0.3987.87 (boo#1162833).

Security issues fixed:

  • CVE-2020-6381: Integer overflow in JavaScript (boo#1162833).
  • CVE-2020-6382: Type Confusion in JavaScript (boo#1162833).
  • CVE-2019-18197: Multiple vulnerabilities in XML (boo#1162833).
  • CVE-2019-19926: Inappropriate implementation in SQLite (boo#1162833).
  • CVE-2020-6385: Insufficient policy enforcement in storage (boo#1162833).
  • CVE-2019-19880, CVE-2019-19925: Multiple vulnerabilities in SQLite
    (boo#1162833).
  • CVE-2020-6387: Out of bounds write in WebRTC (boo#1162833).
  • CVE-2020-6388: Out of bounds memory access in WebAudio (boo#1162833).
  • CVE-2020-6389: Out of bounds write in WebRTC (boo#1162833).
  • CVE-2020-6390: Out of bounds memory access in streams (boo#1162833).
  • CVE-2020-6391: Insufficient validation of untrusted input in Blink
    (boo#1162833).
  • CVE-2020-6392: Insufficient policy enforcement in extensions
    (boo#1162833).
  • CVE-2020-6393: Insufficient policy enforcement in Blink (boo#1162833).
  • CVE-2020-6394: Insufficient policy enforcement in Blink (boo#1162833).
  • CVE-2020-6395: Out of bounds read in JavaScript (boo#1162833).
  • CVE-2020-6396: Inappropriate implementation in Skia (boo#1162833).
  • CVE-2020-6397: Incorrect security UI in sharing (boo#1162833).
  • CVE-2020-6398: Uninitialized use in PDFium (boo#1162833).
  • CVE-2020-6399: Insufficient policy enforcement in AppCache (boo#1162833).
  • CVE-2020-6400: Inappropriate implementation in CORS (boo#1162833).
  • CVE-2020-6401: Insufficient validation of untrusted input in Omnibox
    (boo#1162833).
  • CVE-2020-6402: Insufficient policy enforcement in downloads
    (boo#1162833).
  • CVE-2020-6403: Incorrect security UI in Omnibox (boo#1162833).
  • CVE-2020-6404: Inappropriate implementation in Blink (boo#1162833).
  • CVE-2020-6405: Out of bounds read in SQLite (boo#1162833).
  • CVE-2020-6406: Use after free in audio (boo#1162833).
  • CVE-2019-19923: Out of bounds memory access in SQLite (boo#1162833).
  • CVE-2020-6408: Insufficient policy enforcement in CORS (boo#1162833).
  • CVE-2020-6409: Inappropriate implementation in Omnibox (boo#1162833).
  • CVE-2020-6410: Insufficient policy enforcement in navigation
    (boo#1162833).
  • CVE-2020-6411: Insufficient validation of untrusted input in Omnibox
    (boo#1162833).
  • CVE-2020-6412: Insufficient validation of untrusted input in Omnibox
    (boo#1162833).
  • CVE-2020-6413: Inappropriate implementation in Blink (boo#1162833).
  • CVE-2020-6414: Insufficient policy enforcement in Safe Browsing
    (boo#1162833).
  • CVE-2020-6415: Inappropriate implementation in JavaScript (boo#1162833).
  • CVE-2020-6416: Insufficient data validation in streams (boo#1162833).
  • CVE-2020-6417: Inappropriate implementation in installer (boo#1162833).

This update was imported from the openSUSE:Leap:15.1:Update update project.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

  • openSUSE Backports SLE-15-SP1:

    zypper in -t patch openSUSE-2020-210=1

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P