Lucene search

K
suseSuseOPENSUSE-SU-2020:1499-1
HistorySep 22, 2020 - 12:00 a.m.

Security update for chromium (important)

2020-09-2200:00:00
lists.opensuse.org
22

9.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

An update that fixes 19 vulnerabilities is now available.

Description:

This update for chromium fixes the following issues:

Chromium was updated to version 85.0.4183.102 (bsc#1176306) fixing:

  • CVE-2020-6573: Use after free in video.
  • CVE-2020-6574: Insufficient policy enforcement in installer.
  • CVE-2020-6575: Race in Mojo.
  • CVE-2020-6576: Use after free in offscreen canvas.
  • CVE-2020-15959: Insufficient policy enforcement in networking.

Chromium was updated to version 85.0.4183.83 (boo#1175757) fixing:

  • CVE-2020-6558: Insufficient policy enforcement in iOS
  • CVE-2020-6559: Use after free in presentation API
  • CVE-2020-6560: Insufficient policy enforcement in autofill
  • CVE-2020-6561: Inappropriate implementation in Content Security Policy
  • CVE-2020-6562: Insufficient policy enforcement in Blink
  • CVE-2020-6563: Insufficient policy enforcement in intent handling.
  • CVE-2020-6564: Incorrect security UI in permissions
  • CVE-2020-6565: Incorrect security UI in Omnibox.
  • CVE-2020-6566: Insufficient policy enforcement in media.
  • CVE-2020-6567: Insufficient validation of untrusted input in command
    line handling.
  • CVE-2020-6568: Insufficient policy enforcement in intent handling.
  • CVE-2020-6569: Integer overflow in WebUSB.
  • CVE-2020-6570: Side-channel information leakage in WebRTC.
  • CVE-2020-6571: Incorrect security UI in Omnibox.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

  • openSUSE Leap 15.2:

    zypper in -t patch openSUSE-2020-1499=1

  • openSUSE Leap 15.1:

    zypper in -t patch openSUSE-2020-1499=1

OSVersionArchitecturePackageVersionFilename
openSUSE Leap15.2x86_64< - openSUSE Leap 15.2 (x86_64):- openSUSE Leap 15.2 (x86_64):.x86_64.rpm
openSUSE Leap15.1x86_64< - openSUSE Leap 15.1 (x86_64):- openSUSE Leap 15.1 (x86_64):.x86_64.rpm

9.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C