ID

VAR-202011-0444


CVE

CVE-2020-15969


TITLE

Google Chrome Resource Management Error Vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-202010-368

DESCRIPTION

Use after free in WebRTC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Chrome has security holes. For the stable distribution (buster), these problems have been fixed in version 78.4.0esr-1~deb10u2. We recommend that you upgrade your firefox-esr packages. For the detailed security status of firefox-esr please refer to its security tracker page at: https://security-tracker.debian.org/tracker/firefox-esr Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAl+QmrIACgkQEMKTtsN8 TjY0SA/7Bi6DCA+MNYNvsU+WqZhmdSk68BEUhR2tCpbeGzb7q9DF1xEnBhhXMzqw b1953Pp7F5kBfvgM59pNTBne5Z/OI8YlklcMcl04+ubuAUtXgQbOG/U3PbJ70LKw b9/AzIn6tPpm4B54WJHalB+3hrzlViZGcu9FOI9INy8Kjs4F2ZF7kGeE4SFiKsNN WtDZLdjBPu+aFHgZJouZWp1NmJfP/+iZC/J69G3YtQ4hdWgoH5l6cO4Pdfwo0+yu bSeFhHSLKmGqbxTqxsKm0Ux3yXBup/Fw/PAdgHozEnBlWxXIYnQ1VVuVGgMSdafJ ViT7h4i5f1Q+CznHgZZEhSrEj8qsCSdsWS4aQXsBB3AOuonLQWX9T3apgHksgZ9h sdt9qOw0eUMv93Sla5hAQzZKKdY5CfcDL2fBv3ZYBpQl+JSd2v7p64p28dbvhFj5 4Rv/nr7SjFmnW4SkLk/aplXGsI2kxy93ti7xKH6ymATu0S4k1+jECjlbqFgg8owm cUc85KBuwLvPVNV9BKoIxkhzZ7floeSqe9pNyAHgUj54jz6d6h9T3mYo1LLNGyBD FoMGD3W+6vxAf14kQEPD4Hteen1KgOT5Qx4wFEFIm/VhUP+pJ71L0cg+bdjp4/Gf BNmp0NK56vqjTI6RvgT7vV1bpZeYrFye7fGvKv/GBPVKog/Fwc8= =Mviy -----END PGP SIGNATURE----- . Description: Mozilla Thunderbird is a standalone mail and newsgroup client. 8.1) - aarch64, ppc64le, s390x, x86_64 3. 6) - i386, i686, x86_64 3. Security Fix(es): * chromium-browser: Use after free in payments (CVE-2020-15967) * chromium-browser: Use after free in Blink (CVE-2020-15968) * chromium-browser: Use after free in WebRTC (CVE-2020-15969) * chromium-browser: Use after free in NFC (CVE-2020-15970) * chromium-browser: Use after free in printing (CVE-2020-15971) * chromium-browser: Use after free in audio (CVE-2020-15972) * chromium-browser: Use after free in autofill (CVE-2020-15990) * chromium-browser: Use after free in password manager (CVE-2020-15991) * chromium-browser: Inappropriate implementation in networking (CVE-2020-6557) * chromium-browser: Insufficient policy enforcement in extensions (CVE-2020-15973) * chromium-browser: Integer overflow in Blink (CVE-2020-15974) * chromium-browser: Integer overflow in SwiftShader (CVE-2020-15975) * chromium-browser: Use after free in WebXR (CVE-2020-15976) * chromium-browser: Insufficient data validation in dialogs (CVE-2020-15977) * chromium-browser: Insufficient data validation in navigation (CVE-2020-15978) * chromium-browser: Inappropriate implementation in V8 (CVE-2020-15979) * chromium-browser: Insufficient policy enforcement in Intents (CVE-2020-15980) * chromium-browser: Out of bounds read in audio (CVE-2020-15981) * chromium-browser: Side-channel information leakage in cache (CVE-2020-15982) * chromium-browser: Insufficient data validation in webUI (CVE-2020-15983) * chromium-browser: Insufficient policy enforcement in Omnibox (CVE-2020-15984) * chromium-browser: Inappropriate implementation in Blink (CVE-2020-15985) * chromium-browser: Integer overflow in media (CVE-2020-15986) * chromium-browser: Use after free in WebRTC (CVE-2020-15987) * chromium-browser: Insufficient policy enforcement in networking (CVE-2020-15992) * chromium-browser: Insufficient policy enforcement in downloads (CVE-2020-15988) * chromium-browser: Uninitialized use in PDFium (CVE-2020-15989) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bugs fixed (https://bugzilla.redhat.com/): 1885883 - CVE-2020-15967 chromium-browser: Use after free in payments 1885884 - CVE-2020-15968 chromium-browser: Use after free in Blink 1885885 - CVE-2020-15969 chromium-browser: Use after free in WebRTC 1885886 - CVE-2020-15970 chromium-browser: Use after free in NFC 1885887 - CVE-2020-15971 chromium-browser: Use after free in printing 1885888 - CVE-2020-15972 chromium-browser: Use after free in audio 1885889 - CVE-2020-15990 chromium-browser: Use after free in autofill 1885890 - CVE-2020-15991 chromium-browser: Use after free in password manager 1885891 - CVE-2020-15973 chromium-browser: Insufficient policy enforcement in extensions 1885892 - CVE-2020-15974 chromium-browser: Integer overflow in Blink 1885893 - CVE-2020-15975 chromium-browser: Integer overflow in SwiftShader 1885894 - CVE-2020-15976 chromium-browser: Use after free in WebXR 1885896 - CVE-2020-6557 chromium-browser: Inappropriate implementation in networking 1885897 - CVE-2020-15977 chromium-browser: Insufficient data validation in dialogs 1885899 - CVE-2020-15978 chromium-browser: Insufficient data validation in navigation 1885901 - CVE-2020-15979 chromium-browser: Inappropriate implementation in V8 1885902 - CVE-2020-15980 chromium-browser: Insufficient policy enforcement in Intents 1885903 - CVE-2020-15981 chromium-browser: Out of bounds read in audio 1885904 - CVE-2020-15982 chromium-browser: Side-channel information leakage in cache 1885905 - CVE-2020-15983 chromium-browser: Insufficient data validation in webUI 1885906 - CVE-2020-15984 chromium-browser: Insufficient policy enforcement in Omnibox 1885907 - CVE-2020-15985 chromium-browser: Inappropriate implementation in Blink 1885908 - CVE-2020-15986 chromium-browser: Integer overflow in media 1885909 - CVE-2020-15987 chromium-browser: Use after free in WebRTC 1885910 - CVE-2020-15992 chromium-browser: Insufficient policy enforcement in networking 1885911 - CVE-2020-15988 chromium-browser: Insufficient policy enforcement in downloads 1885912 - CVE-2020-15989 chromium-browser: Uninitialized use in PDFium 6. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202010-01 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: Chromium, Google Chrome: Multiple vulnerabilities Date: October 17, 2020 Bugs: #747013 ID: 202010-01 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in Chromium and Google Chrome, the worst of which could result in the arbitrary execution of code. Background ========== Chromium is an open-source browser project that aims to build a safer, faster, and more stable way for all users to experience the web. Google Chrome is one fast, simple, and secure browser for all your devices. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 www-client/chromium < 86.0.4240.75 >= 86.0.4240.75 2 www-client/google-chrome < 86.0.4240.75 >= 86.0.4240.75 ------------------------------------------------------------------- 2 affected packages Description =========== Multiple vulnerabilities have been discovered in Chromium and Google Chrome. Please review the CVE identifiers referenced below for details. Impact ====== Please review the referenced CVE identifiers for details. Workaround ========== There is no known workaround at this time. Resolution ========== All Chromium users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot -v ">=www-client/chromium-86.0.4240.75" All Google Chrome users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot -v ">=www-client/google-chrome-86.0.4240.75" References ========== [ 1 ] CVE-2020-15967 https://nvd.nist.gov/vuln/detail/CVE-2020-15967 [ 2 ] CVE-2020-15968 https://nvd.nist.gov/vuln/detail/CVE-2020-15968 [ 3 ] CVE-2020-15969 https://nvd.nist.gov/vuln/detail/CVE-2020-15969 [ 4 ] CVE-2020-15970 https://nvd.nist.gov/vuln/detail/CVE-2020-15970 [ 5 ] CVE-2020-15971 https://nvd.nist.gov/vuln/detail/CVE-2020-15971 [ 6 ] CVE-2020-15972 https://nvd.nist.gov/vuln/detail/CVE-2020-15972 [ 7 ] CVE-2020-15973 https://nvd.nist.gov/vuln/detail/CVE-2020-15973 [ 8 ] CVE-2020-15974 https://nvd.nist.gov/vuln/detail/CVE-2020-15974 [ 9 ] CVE-2020-15975 https://nvd.nist.gov/vuln/detail/CVE-2020-15975 [ 10 ] CVE-2020-15976 https://nvd.nist.gov/vuln/detail/CVE-2020-15976 [ 11 ] CVE-2020-15977 https://nvd.nist.gov/vuln/detail/CVE-2020-15977 [ 12 ] CVE-2020-15978 https://nvd.nist.gov/vuln/detail/CVE-2020-15978 [ 13 ] CVE-2020-15979 https://nvd.nist.gov/vuln/detail/CVE-2020-15979 [ 14 ] CVE-2020-15980 https://nvd.nist.gov/vuln/detail/CVE-2020-15980 [ 15 ] CVE-2020-15981 https://nvd.nist.gov/vuln/detail/CVE-2020-15981 [ 16 ] CVE-2020-15982 https://nvd.nist.gov/vuln/detail/CVE-2020-15982 [ 17 ] CVE-2020-15983 https://nvd.nist.gov/vuln/detail/CVE-2020-15983 [ 18 ] CVE-2020-15984 https://nvd.nist.gov/vuln/detail/CVE-2020-15984 [ 19 ] CVE-2020-15985 https://nvd.nist.gov/vuln/detail/CVE-2020-15985 [ 20 ] CVE-2020-15986 https://nvd.nist.gov/vuln/detail/CVE-2020-15986 [ 21 ] CVE-2020-15987 https://nvd.nist.gov/vuln/detail/CVE-2020-15987 [ 22 ] CVE-2020-15988 https://nvd.nist.gov/vuln/detail/CVE-2020-15988 [ 23 ] CVE-2020-15989 https://nvd.nist.gov/vuln/detail/CVE-2020-15989 [ 24 ] CVE-2020-15990 https://nvd.nist.gov/vuln/detail/CVE-2020-15990 [ 25 ] CVE-2020-15991 https://nvd.nist.gov/vuln/detail/CVE-2020-15991 [ 26 ] CVE-2020-15992 https://nvd.nist.gov/vuln/detail/CVE-2020-15992 [ 27 ] CVE-2020-6557 https://nvd.nist.gov/vuln/detail/CVE-2020-6557 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/202010-01 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2020 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. https://creativecommons.org/licenses/by-sa/2.5 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: firefox security update Advisory ID: RHSA-2020:4330-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2020:4330 Issue date: 2020-10-26 CVE Names: CVE-2020-15683 CVE-2020-15969 ===================================================================== 1. Summary: An update for firefox is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - x86_64 3. Description: Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 78.4.0 ESR. Security Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4 (CVE-2020-15683) * chromium-browser: Use after free in WebRTC (CVE-2020-15969) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, Firefox must be restarted for the changes to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1885885 - CVE-2020-15969 chromium-browser: Use after free in WebRTC 1889932 - CVE-2020-15683 Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: firefox-78.4.0-2.el6_10.src.rpm i386: firefox-78.4.0-2.el6_10.i686.rpm x86_64: firefox-78.4.0-2.el6_10.x86_64.rpm firefox-debuginfo-78.4.0-2.el6_10.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): x86_64: firefox-78.4.0-2.el6_10.i686.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: firefox-78.4.0-2.el6_10.src.rpm x86_64: firefox-78.4.0-2.el6_10.i686.rpm firefox-78.4.0-2.el6_10.x86_64.rpm firefox-debuginfo-78.4.0-2.el6_10.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: firefox-78.4.0-2.el6_10.src.rpm i386: firefox-78.4.0-2.el6_10.i686.rpm ppc64: firefox-78.4.0-2.el6_10.ppc64.rpm firefox-debuginfo-78.4.0-2.el6_10.ppc64.rpm s390x: firefox-78.4.0-2.el6_10.s390x.rpm firefox-debuginfo-78.4.0-2.el6_10.s390x.rpm x86_64: firefox-78.4.0-2.el6_10.x86_64.rpm firefox-debuginfo-78.4.0-2.el6_10.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): x86_64: firefox-78.4.0-2.el6_10.i686.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: firefox-78.4.0-2.el6_10.src.rpm i386: firefox-78.4.0-2.el6_10.i686.rpm x86_64: firefox-78.4.0-2.el6_10.x86_64.rpm firefox-debuginfo-78.4.0-2.el6_10.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): x86_64: firefox-78.4.0-2.el6_10.i686.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2020-15683 https://access.redhat.com/security/cve/CVE-2020-15969 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2020 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBX5aQX9zjgjWX9erEAQgvHg//ftH/tBsuOG97gXdHwq4+yb29CS7rvR59 84l6moa4n9s6aUcamKG5/kiOu1XToev/N91+2fR7eLL/D3HeAFPbEmi0ta9Jeo5n /UzeHBi3bBpOq4JcxgRwdoSwuYYaVpJFPOnvYk2bWoaEKkwPzxf0fP9Hje7iheJM mQ9gKYq3sVTC+iWLpyFMhXpo54lVevUIrTRocVVrORs1nj5YNnFA9OkIJZNr5h9N MrwSBS8HH8Cm18MKkQ+LuUiy9da8lYx5lI96Hps6USJ8HhP3eEbkdkBCCsnGGh6w 4otFO2hSOTwGB+++PCGACUtfhzpzd4TKLd/qsYO+LnJOq5f8EpqrC3XUGOztHC+o Jx2ScU9VBcQoRDKQNJIjVnGEoyjF14RPw1N3sbvAQE0GLpUkJd8dtQJ9/yukmE9i 2ViqyGANt84/2rHZ/Y95SIpcZYiFemmXFis3QY7MUeTv3qlsJL4zQwNuXP2fbpN1 o+cYV677B0NP2UfzB++9SFg8kt78nWq3d4GXNuuBVMDJNfDNyG/6FGDeemcm1N+e lCGm734rwZfTA6ABqfwZX4hbgWHIdpczaH2XcZKUTGj0TvuNLVnpFHGril5tbkNc yT6cjn+vpCblUtuMd3Ao3SBB2X4wxTkrzcK5Zxyd8rWk1Z1Yon6guETtRnbDw32Z GKriN2WgPW8= =vjZ7 -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . 8.2) - aarch64, ppc64le, x86_64 3

Trust: 1.8

sources: NVD: CVE-2020-15969 // VULHUB: VHN-169000 // PACKETSTORM: 168916 // PACKETSTORM: 159910 // PACKETSTORM: 159683 // PACKETSTORM: 159536 // PACKETSTORM: 159587 // PACKETSTORM: 159695 // PACKETSTORM: 159906 // PACKETSTORM: 159746 // PACKETSTORM: 159682

AFFECTED PRODUCTS

vendor:fedoraprojectmodel:fedorascope:eqversion:33

Trust: 1.0

vendor:applemodel:watchosscope:ltversion:7.2

Trust: 1.0

vendor:opensusemodel:backports slescope:eqversion:15.0

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:31

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:10.0

Trust: 1.0

vendor:applemodel:macosscope:ltversion:11.1

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:32

Trust: 1.0

vendor:applemodel:tvosscope:ltversion:14.3

Trust: 1.0

vendor:applemodel:ipadosscope:ltversion:14.3

Trust: 1.0

vendor:googlemodel:chromescope:ltversion:86.0.4240.75

Trust: 1.0

vendor:applemodel:safariscope:ltversion:14.0.2

Trust: 1.0

vendor:applemodel:iphone osscope:ltversion:14.3

Trust: 1.0

sources: NVD: CVE-2020-15969

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-15969
value: HIGH

Trust: 1.0

CNNVD: CNNVD-202010-368
value: HIGH

Trust: 0.6

VULHUB: VHN-169000
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2020-15969
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-169000
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-15969
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: VULHUB: VHN-169000 // CNNVD: CNNVD-202010-368 // NVD: CVE-2020-15969

PROBLEMTYPE DATA

problemtype:CWE-416

Trust: 1.1

problemtype:CWE-787

Trust: 1.1

sources: VULHUB: VHN-169000 // NVD: CVE-2020-15969

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202010-368

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-202010-368

PATCH

title:Google Chrome Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=130225

Trust: 0.6

sources: CNNVD: CNNVD-202010-368

EXTERNAL IDS

db:NVDid:CVE-2020-15969

Trust: 2.7

db:PACKETSTORMid:159695

Trust: 0.8

db:PACKETSTORMid:159906

Trust: 0.8

db:PACKETSTORMid:159587

Trust: 0.8

db:PACKETSTORMid:159536

Trust: 0.8

db:PACKETSTORMid:159746

Trust: 0.8

db:PACKETSTORMid:159893

Trust: 0.7

db:PACKETSTORMid:161131

Trust: 0.7

db:PACKETSTORMid:159679

Trust: 0.7

db:PACKETSTORMid:160536

Trust: 0.7

db:AUSCERTid:ESB-2020.3629

Trust: 0.6

db:AUSCERTid:ESB-2020.4396

Trust: 0.6

db:AUSCERTid:ESB-2020.3733

Trust: 0.6

db:AUSCERTid:ESB-2020.3799

Trust: 0.6

db:AUSCERTid:ESB-2020.3770

Trust: 0.6

db:AUSCERTid:ESB-2020.3701

Trust: 0.6

db:AUSCERTid:ESB-2020.3649

Trust: 0.6

db:AUSCERTid:ESB-2020.3693

Trust: 0.6

db:AUSCERTid:ESB-2020.3667

Trust: 0.6

db:AUSCERTid:ESB-2020.3799.2

Trust: 0.6

db:AUSCERTid:ESB-2021.0024

Trust: 0.6

db:AUSCERTid:ESB-2020.4196

Trust: 0.6

db:AUSCERTid:ESB-2020.3531

Trust: 0.6

db:NSFOCUSid:50383

Trust: 0.6

db:CNNVDid:CNNVD-202010-368

Trust: 0.6

db:PACKETSTORMid:159683

Trust: 0.2

db:PACKETSTORMid:159910

Trust: 0.2

db:PACKETSTORMid:159682

Trust: 0.2

db:PACKETSTORMid:159909

Trust: 0.1

db:PACKETSTORMid:160538

Trust: 0.1

db:PACKETSTORMid:160543

Trust: 0.1

db:PACKETSTORMid:160542

Trust: 0.1

db:PACKETSTORMid:159907

Trust: 0.1

db:PACKETSTORMid:160540

Trust: 0.1

db:PACKETSTORMid:159888

Trust: 0.1

db:PACKETSTORMid:159686

Trust: 0.1

db:VULHUBid:VHN-169000

Trust: 0.1

db:PACKETSTORMid:168970

Trust: 0.1

db:PACKETSTORMid:168916

Trust: 0.1

sources: VULHUB: VHN-169000 // PACKETSTORM: 168970 // PACKETSTORM: 168916 // PACKETSTORM: 159910 // PACKETSTORM: 159683 // PACKETSTORM: 159536 // PACKETSTORM: 159587 // PACKETSTORM: 159695 // PACKETSTORM: 159906 // PACKETSTORM: 159746 // PACKETSTORM: 159682 // CNNVD: CNNVD-202010-368 // NVD: CVE-2020-15969

REFERENCES

url:https://support.apple.com/kb/ht212003

Trust: 1.7

url:https://support.apple.com/kb/ht212005

Trust: 1.7

url:https://support.apple.com/kb/ht212007

Trust: 1.7

url:https://support.apple.com/kb/ht212009

Trust: 1.7

url:https://support.apple.com/kb/ht212011

Trust: 1.7

url:https://www.debian.org/security/2021/dsa-4824

Trust: 1.7

url:http://seclists.org/fulldisclosure/2020/dec/24

Trust: 1.7

url:http://seclists.org/fulldisclosure/2020/dec/26

Trust: 1.7

url:http://seclists.org/fulldisclosure/2020/dec/27

Trust: 1.7

url:http://seclists.org/fulldisclosure/2020/dec/29

Trust: 1.7

url:http://seclists.org/fulldisclosure/2020/dec/30

Trust: 1.7

url:https://security.gentoo.org/glsa/202101-30

Trust: 1.7

url:https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html

Trust: 1.7

url:https://crbug.com/1124659

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2020-15969

Trust: 1.6

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4gwcwnhttyoh6hsfuxpgpbb6j6jyzhze/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/24qfl4c3azkmfvl7lvsymu2dne5vvugs/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/sc3u3h6aisvzb5plzllnf4hmq4uffl7m/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4gwcwnhttyoh6hsfuxpgpbb6j6jyzhze/

Trust: 0.7

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/sc3u3h6aisvzb5plzllnf4hmq4uffl7m/

Trust: 0.7

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/24qfl4c3azkmfvl7lvsymu2dne5vvugs/

Trust: 0.7

url:https://nvd.nist.gov/vuln/detail/cve-2020-15683

Trust: 0.7

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2020-15969

Trust: 0.6

url:https://bugzilla.redhat.com/):

Trust: 0.6

url:https://access.redhat.com/security/team/key/

Trust: 0.6

url:https://access.redhat.com/articles/11258

Trust: 0.6

url:https://access.redhat.com/security/team/contact/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.3701/

Trust: 0.6

url:https://packetstormsecurity.com/files/160536/apple-security-advisory-2020-12-14-1.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.3733/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.3799/

Trust: 0.6

url:https://packetstormsecurity.com/files/159906/red-hat-security-advisory-2020-4948-01.html

Trust: 0.6

url:https://packetstormsecurity.com/files/161131/gentoo-linux-security-advisory-202101-30.html

Trust: 0.6

url:https://vigilance.fr/vulnerability/usersctp-use-after-free-via-sctp-process-a-data-chunk-33635

Trust: 0.6

url:http://www.nsfocus.net/vulndb/50383

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0024/

Trust: 0.6

url:https://packetstormsecurity.com/files/159746/gentoo-linux-security-advisory-202010-08.html

Trust: 0.6

url:https://vigilance.fr/vulnerability/chrome-multiple-vulnerabilities-33498

Trust: 0.6

url:https://packetstormsecurity.com/files/159695/red-hat-security-advisory-2020-4330-01.html

Trust: 0.6

url:https://packetstormsecurity.com/files/159587/gentoo-linux-security-advisory-202010-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.3531/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.4196/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.3667/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.3629/

Trust: 0.6

url:https://packetstormsecurity.com/files/159893/red-hat-security-advisory-2020-4909-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.3649/

Trust: 0.6

url:https://support.apple.com/en-us/ht212005

Trust: 0.6

url:https://support.apple.com/en-us/ht212009

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.4396/

Trust: 0.6

url:https://packetstormsecurity.com/files/159679/red-hat-security-advisory-2020-4311-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.3799.2/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.3770/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.3693/

Trust: 0.6

url:https://packetstormsecurity.com/files/159536/red-hat-security-advisory-2020-4235-01.html

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2020-15683

Trust: 0.5

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2020-15968

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2020-15970

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2020-15967

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2020-15971

Trust: 0.3

url:https://www.debian.org/security/faq

Trust: 0.2

url:https://www.debian.org/security/

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-15972

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-15986

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-15977

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-15979

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-15989

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-15983

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-15991

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-15987

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-15973

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-15975

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-15978

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-15981

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-15988

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-15984

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-15980

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-15982

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-15974

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-15985

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-15976

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-15992

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-15990

Trust: 0.2

url:https://security.gentoo.org/

Trust: 0.2

url:https://creativecommons.org/licenses/by-sa/2.5

Trust: 0.2

url:https://bugs.gentoo.org.

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-15966

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15960

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15959

Trust: 0.1

url:https://security-tracker.debian.org/tracker/chromium

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15963

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15962

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15964

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15965

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15961

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8075

Trust: 0.1

url:https://security-tracker.debian.org/tracker/firefox-esr

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:4947

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:4315

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:4235

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15990

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15974

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15971

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15968

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15984

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#critical

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15972

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15973

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15987

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15988

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15978

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15989

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15970

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6557

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15977

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15985

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15992

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15980

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15975

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15982

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15967

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15981

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15983

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15976

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15991

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15979

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15986

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6557

Trust: 0.1

url:https://security.gentoo.org/glsa/202010-01

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:4330

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:4948

Trust: 0.1

url:https://www.mozilla.org/en-us/security/advisories/mfsa2020-47/

Trust: 0.1

url:https://www.mozilla.org/en-us/security/advisories/mfsa2020-46/

Trust: 0.1

url:https://security.gentoo.org/glsa/202010-08

Trust: 0.1

url:https://www.mozilla.org/en-us/security/advisories/mfsa2020-45/

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:4310

Trust: 0.1

sources: VULHUB: VHN-169000 // PACKETSTORM: 168970 // PACKETSTORM: 168916 // PACKETSTORM: 159910 // PACKETSTORM: 159683 // PACKETSTORM: 159536 // PACKETSTORM: 159587 // PACKETSTORM: 159695 // PACKETSTORM: 159906 // PACKETSTORM: 159746 // PACKETSTORM: 159682 // CNNVD: CNNVD-202010-368 // NVD: CVE-2020-15969

CREDITS

Gentoo

Trust: 0.8

sources: PACKETSTORM: 159587 // PACKETSTORM: 159746 // CNNVD: CNNVD-202010-368

SOURCES

db:VULHUBid:VHN-169000
db:PACKETSTORMid:168970
db:PACKETSTORMid:168916
db:PACKETSTORMid:159910
db:PACKETSTORMid:159683
db:PACKETSTORMid:159536
db:PACKETSTORMid:159587
db:PACKETSTORMid:159695
db:PACKETSTORMid:159906
db:PACKETSTORMid:159746
db:PACKETSTORMid:159682
db:CNNVDid:CNNVD-202010-368
db:NVDid:CVE-2020-15969

LAST UPDATE DATE

2026-02-06T20:22:14.005000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-169000date:2021-07-21T00:00:00
db:CNNVDid:CNNVD-202010-368date:2021-11-03T00:00:00
db:NVDid:CVE-2020-15969date:2024-11-21T05:06:34.250

SOURCES RELEASE DATE

db:VULHUBid:VHN-169000date:2020-11-03T00:00:00
db:PACKETSTORMid:168970date:2021-01-28T20:12:00
db:PACKETSTORMid:168916date:2020-10-28T19:12:00
db:PACKETSTORMid:159910date:2020-11-05T17:01:22
db:PACKETSTORMid:159683date:2020-10-22T23:55:51
db:PACKETSTORMid:159536date:2020-10-13T20:24:04
db:PACKETSTORMid:159587date:2020-10-17T19:32:22
db:PACKETSTORMid:159695date:2020-10-26T16:22:47
db:PACKETSTORMid:159906date:2020-11-05T17:00:50
db:PACKETSTORMid:159746date:2020-10-28T16:36:31
db:PACKETSTORMid:159682date:2020-10-22T23:55:44
db:CNNVDid:CNNVD-202010-368date:2020-10-07T00:00:00
db:NVDid:CVE-2020-15969date:2020-11-03T03:15:12.790