9.6 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
An update that fixes 39 vulnerabilities is now available.
Description:
This update for chromium, gn fixes the following issues:
chromium was updated to 86.0.4240.183 boo#1178375
Update to 86.0.4240.111 boo#1177936
CVE-2020-16000: Inappropriate implementation in Blink.
CVE-2020-16001: Use after free in media.
CVE-2020-16002: Use after free in PDFium.
CVE-2020-15999: Heap buffer overflow in Freetype.
CVE-2020-16003: Use after free in printing.
chromium-86-f_seal.patch: F_SEAL* definitions added for leap 15.1 and
15.2
Remove vdpau->vaapi bridge as it breaks a lot: (fixes welcome by someone
else than me)
Fix cookiemonster:
Update to 86.0.4240.75 boo#1177408:
Update to 0.1807:
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
openSUSE Backports SLE-15-SP2:
zypper in -t patch openSUSE-2020-1829=1
9.6 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P