ID

VAR-202011-0444


CVE

CVE-2020-15969


TITLE

Google Chrome  Vulnerabilities in the use of freed memory

Trust: 0.8

sources: JVNDB: JVNDB-2020-013002

DESCRIPTION

Use after free in WebRTC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Google Chrome Is vulnerable to the use of freed memory.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Google Chrome is a web browser developed by Google (Google). Chrome has security holes. 6) - i386, x86_64 3. Description: Mozilla Thunderbird is a standalone mail and newsgroup client. 8.0) - aarch64, ppc64le, s390x, x86_64 3. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-2020-12-14-3 macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave addresses the following issues. Information about the security content is also available at https://support.apple.com/HT212011. AMD Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved input validation. CVE-2020-27914: Yu Wang of Didi Research America CVE-2020-27915: Yu Wang of Didi Research America App Store Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: An application may be able to gain elevated privileges Description: This issue was addressed by removing the vulnerable code. CVE-2020-27903: Zhipeng Huo (@R3dF09) of Tencent Security Xuanwu Lab AppleGraphicsControl Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7, macOS Big Sur 11.0.1 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A validation issue was addressed with improved logic. CVE-2020-27941: shrek_wzw AppleMobileFileIntegrity Available for: macOS Big Sur 11.0.1 Impact: A malicious application may be able to bypass Privacy preferences Description: This issue was addressed with improved checks. CVE-2020-29621: Wojciech Reguła (@_r3ggi) of SecuRing Audio Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: Processing a maliciously crafted audio file may lead to arbitrary code execution Description: An out-of-bounds read was addressed with improved input validation. CVE-2020-27910: JunDong Xie and XingWei Lin of Ant Security Light- Year Lab Audio Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: A malicious application may be able to read restricted memory Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2020-9943: JunDong Xie of Ant Security Light-Year Lab Audio Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: An application may be able to read restricted memory Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2020-9944: JunDong Xie of Ant Security Light-Year Lab Audio Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: Processing a maliciously crafted audio file may lead to arbitrary code execution Description: An out-of-bounds write was addressed with improved input validation. CVE-2020-27916: JunDong Xie of Ant Security Light-Year Lab Bluetooth Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: A remote attacker may be able to cause unexpected application termination or heap corruption Description: Multiple integer overflows were addressed with improved input validation. CVE-2020-27906: Zuozhi Fan (@pattern_F_) of Ant Group Tianqiong Security Lab CoreAudio Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7, macOS Big Sur 11.0.1 Impact: Processing a maliciously crafted audio file may lead to arbitrary code execution Description: An out-of-bounds write issue was addressed with improved bounds checking. CVE-2020-27948: JunDong Xie of Ant Security Light-Year Lab CoreAudio Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: Processing a maliciously crafted audio file may lead to arbitrary code execution Description: An out-of-bounds read was addressed with improved input validation. CVE-2020-9960: JunDong Xie and XingWei Lin of Ant Security Light-Year Lab CVE-2020-27908: JunDong Xie and XingWei Lin of Ant Security Light- Year Lab CoreAudio Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: Processing a maliciously crafted audio file may lead to arbitrary code execution Description: An out-of-bounds write was addressed with improved input validation. CVE-2020-10017: Francis working with Trend Micro Zero Day Initiative, JunDong Xie of Ant Security Light-Year Lab CoreText Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: Processing a maliciously crafted font file may lead to arbitrary code execution Description: A logic issue was addressed with improved state management. CVE-2020-27922: Mickey Jin of Trend Micro FontParser Available for: macOS Big Sur 11.0.1 Impact: Processing a maliciously crafted font may result in the disclosure of process memory Description: An information disclosure issue was addressed with improved state management. CVE-2020-27946: Mateusz Jurczyk of Google Project Zero FontParser Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: Processing a maliciously crafted image may lead to arbitrary code execution Description: A buffer overflow was addressed with improved size validation. CVE-2020-9962: Yiğit Can YILMAZ (@yilmazcanyigit) FontParser Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: Processing a maliciously crafted font file may lead to arbitrary code execution Description: An out-of-bounds write was addressed with improved input validation. CVE-2020-27952: an anonymous researcher, Mickey Jin and Junzhi Lu of Trend Micro FontParser Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: Processing a maliciously crafted font file may lead to arbitrary code execution Description: An out-of-bounds read was addressed with improved input validation. CVE-2020-9956: Mickey Jin and Junzhi Lu of Trend Micro Mobile Security Research Team working with Trend Micro’s Zero Day Initiative FontParser Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7, macOS Big Sur 11.0.1 Impact: Processing a maliciously crafted font file may lead to arbitrary code execution Description: A memory corruption issue existed in the processing of font files. This issue was addressed with improved input validation. CVE-2020-27931: Apple CVE-2020-27943: Mateusz Jurczyk of Google Project Zero CVE-2020-27944: Mateusz Jurczyk of Google Project Zero Foundation Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: A local user may be able to read arbitrary files Description: A logic issue was addressed with improved state management. CVE-2020-10002: James Hutchins Graphics Drivers Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7, macOS Big Sur 11.0.1 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved input validation. CVE-2020-27947: ABC Research s.r.o. working with Trend Micro Zero Day Initiative Graphics Drivers Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7, macOS Big Sur 11.0.1 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: An out-of-bounds write issue was addressed with improved bounds checking. CVE-2020-29612: ABC Research s.r.o. working with Trend Micro Zero Day Initiative HomeKit Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: An attacker in a privileged network position may be able to unexpectedly alter application state Description: This issue was addressed with improved setting propagation. CVE-2020-9978: Luyi Xing, Dongfang Zhao, and Xiaofeng Wang of Indiana University Bloomington, Yan Jia of Xidian University and University of Chinese Academy of Sciences, and Bin Yuan of HuaZhong University of Science and Technology Image Processing Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: Processing a maliciously crafted image may lead to arbitrary code execution Description: An out-of-bounds write was addressed with improved input validation. CVE-2020-27919: Hou JingYi (@hjy79425575) of Qihoo 360 CERT, Xingwei Lin of Ant Security Light-Year Lab ImageIO Available for: macOS Big Sur 11.0.1 Impact: Processing a maliciously crafted image may lead to arbitrary code execution Description: A memory corruption issue was addressed with improved input validation. CVE-2020-29616: zhouat working with Trend Micro Zero Day Initiative ImageIO Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7, macOS Big Sur 11.0.1 Impact: Processing a maliciously crafted image may lead to arbitrary code execution Description: An out-of-bounds read was addressed with improved input validation. CVE-2020-27924: Lei Sun CVE-2020-29618: XingWei Lin of Ant Security Light-Year Lab ImageIO Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7, macOS Big Sur 11.0.1 Impact: Processing a maliciously crafted image may lead to arbitrary code execution Description: An out-of-bounds write issue was addressed with improved bounds checking. CVE-2020-29611: Ivan Fratric of Google Project Zero ImageIO Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7, macOS Big Sur 11.0.1 Impact: Processing a maliciously crafted image may lead to heap corruption Description: An out-of-bounds read was addressed with improved input validation. CVE-2020-29617: XingWei Lin of Ant Security Light-Year Lab CVE-2020-29619: XingWei Lin of Ant Security Light-Year Lab ImageIO Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: Processing a maliciously crafted image may lead to arbitrary code execution Description: An out-of-bounds write was addressed with improved input validation. CVE-2020-27912: Xingwei Lin of Ant Security Light-Year Lab CVE-2020-27923: Lei Sun Intel Graphics Driver Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: An application may be able to execute arbitrary code with kernel privileges Description: An out-of-bounds write issue was addressed with improved bounds checking. CVE-2020-10015: ABC Research s.r.o. working with Trend Micro Zero Day Initiative CVE-2020-27897: Xiaolong Bai and Min (Spark) Zheng of Alibaba Inc. and Luyi Xing of Indiana University Bloomington Intel Graphics Driver Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2020-27907: ABC Research s.r.o. working with Trend Micro Zero Day Initiative Kernel Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: A malicious application may be able to determine kernel memory layout Description: A logic issue was addressed with improved state management. CVE-2020-9974: Tommy Muir (@Muirey03) Kernel Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved state management. CVE-2020-10016: Alex Helie Kernel Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: A remote attacker may be able to cause unexpected system termination or corrupt kernel memory Description: Multiple memory corruption issues were addressed with improved input validation. CVE-2020-9967: Alex Plaskett (@alexjplaskett) Kernel Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A use after free issue was addressed with improved memory management. CVE-2020-9975: Tielei Wang of Pangu Lab Kernel Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A race condition was addressed with improved state handling. CVE-2020-27921: Linus Henze (pinauten.de) Kernel Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7, macOS Big Sur 11.0.1 Impact: A malicious application may cause unexpected changes in memory belonging to processes traced by DTrace Description: This issue was addressed with improved checks to prevent unauthorized actions. CVE-2020-27949: Steffen Klee (@_kleest) of TU Darmstadt, Secure Mobile Networking Lab Kernel Available for: macOS Big Sur 11.0.1 Impact: A malicious application may be able to elevate privileges Description: This issue was addressed with improved entitlements. CVE-2020-29620: Csaba Fitzl (@theevilbit) of Offensive Security libxml2 Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: A remote attacker may be able to cause unexpected application termination or arbitrary code execution Description: An integer overflow was addressed through improved input validation. CVE-2020-27911: found by OSS-Fuzz libxml2 Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: Processing maliciously crafted web content may lead to code execution Description: A use after free issue was addressed with improved memory management. CVE-2020-27920: found by OSS-Fuzz libxml2 Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A use after free issue was addressed with improved memory management. CVE-2020-27926: found by OSS-Fuzz libxpc Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: A malicious application may be able to break out of its sandbox Description: A parsing issue in the handling of directory paths was addressed with improved path validation. CVE-2020-10014: Zhipeng Huo (@R3dF09) of Tencent Security Xuanwu Lab Logging Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: A local attacker may be able to elevate their privileges Description: A path handling issue was addressed with improved validation. CVE-2020-10010: Tommy Muir (@Muirey03) Model I/O Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: Processing a maliciously crafted USD file may lead to unexpected application termination or arbitrary code execution Description: An out-of-bounds read was addressed with improved input validation. CVE-2020-13524: Aleksandar Nikolic of Cisco Talos Model I/O Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: Opening a maliciously crafted file may lead to unexpected application termination or arbitrary code execution Description: A logic issue was addressed with improved state management. CVE-2020-10004: Aleksandar Nikolic of Cisco Talos NSRemoteView Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: A sandboxed process may be able to circumvent sandbox restrictions Description: A logic issue was addressed with improved restrictions. CVE-2020-27901: Thijs Alkemade of Computest Research Division Power Management Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: A malicious application may be able to determine kernel memory layout Description: A logic issue was addressed with improved state management. CVE-2020-10007: singi@theori working with Trend Micro Zero Day Initiative Quick Look Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: Processing a maliciously crafted document may lead to a cross site scripting attack Description: An access issue was addressed with improved access restrictions. CVE-2020-10012: Heige of KnownSec 404 Team (knownsec.com) and Bo Qu of Palo Alto Networks (paloaltonetworks.com) Ruby Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: A remote attacker may be able to modify the file system Description: A path handling issue was addressed with improved validation. CVE-2020-27896: an anonymous researcher System Preferences Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: A sandboxed process may be able to circumvent sandbox restrictions Description: A logic issue was addressed with improved state management. CVE-2020-10009: Thijs Alkemade of Computest Research Division WebRTC Available for: macOS Big Sur 11.0.1 Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A use after free issue was addressed with improved memory management. CVE-2020-15969: an anonymous researcher Wi-Fi Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: An attacker may be able to bypass Managed Frame Protection Description: A denial of service issue was addressed with improved state handling. CVE-2020-27898: Stephan Marais of University of Johannesburg Installation note: macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave may be obtained from the Mac App Store or Apple's Software Downloads web site: https://support.apple.com/downloads/ Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEbURczHs1TP07VIfuZcsbuWJ6jjAFAl/YBj8ACgkQZcsbuWJ6 jjCVjw//QGrhMvU+nyuS1UwWs7rcqDJDNh0Zb7yUJali2Bdc9/l++i2pLFbmAwes 7AYCag+T3h3aP7YJAN13zb8KBmUcmnWkWupfx8kEGqHxSXnQTXvaEI59RyCobOCj OVPtboPMH1d94+6dABMp9kiLAHoZezm3hdF8ShT2Hqgq2TB16wZsa/EvhJVSaduA 7RttG6EHBTin6UU3M/+vcfJWqkg4O0YuZpQaconDa5Pd81jpUMeduzfRvS5i+PVS cehtHPWjCN15+sQ29q11yhP3v+sYh0DJEl2LWaBnDo2TlC1gHx70H5ZsAFLHChcd rXkl1tm6GV3UWVhFq0jQc1DP+IwbuL6jHI/wIjYx7itk9XECppyhhiuImOaLiIUH CBgAjwVHY1GUdTH97iPEQFF61v3sjpRLleLMZW7+9ZTt4pEDwMVHk9vKgVK5BUa6 lrKWtBHL3AtaXtxC9y8XGe3IYEBLAszHMUJfF1BR+D/niDRlztvoj72/3PPwtk2t tuUE9RGzpSXCQ1CX6vW7zS2ddVmQfJqcPX721k4OVpFNlMXkjZkm2Q/xwr5qq99v Up9BA+ITksthGYfGAY5bBV1LsjK1NtdNHQGpZe4l9bu4ONgUvmL8iBb/LnS6wKB1 HGcdHEmXvbx+Akl/fvTdG8RSvyoYuFJHkuYv0DMWiri8yN1q+C4= =osnP -----END PGP SIGNATURE----- . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202101-30 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: Qt WebEngine: Multiple vulnerabilities Date: January 26, 2021 Bugs: #734600, #754852 ID: 202101-30 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======= Multiple vulnerabilities have been found in Qt WebEngine, the worst of which could result in the arbitrary execution of code. Background ========= Library for rendering dynamic web content in Qt5 C++ and QML applications. Affected packages ================ ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 dev-qt/qtwebengine < 5.15.2 >= 5.15.2 Description ========== Multiple vulnerabilities have been discovered in Qt WebEngine. Please review the CVE identifiers referenced below for details. Impact ===== Please review the referenced CVE identifiers for details. Workaround ========= There is no known workaround at this time. Resolution ========= All Qt WebEngine users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">\xdev-qt/qtwebengine-5.15.2" References ========= [ 1 ] CVE-2020-15959 https://nvd.nist.gov/vuln/detail/CVE-2020-15959 [ 2 ] CVE-2020-15959 https://nvd.nist.gov/vuln/detail/CVE-2020-15959 [ 3 ] CVE-2020-15960 https://nvd.nist.gov/vuln/detail/CVE-2020-15960 [ 4 ] CVE-2020-15960 https://nvd.nist.gov/vuln/detail/CVE-2020-15960 [ 5 ] CVE-2020-15961 https://nvd.nist.gov/vuln/detail/CVE-2020-15961 [ 6 ] CVE-2020-15961 https://nvd.nist.gov/vuln/detail/CVE-2020-15961 [ 7 ] CVE-2020-15962 https://nvd.nist.gov/vuln/detail/CVE-2020-15962 [ 8 ] CVE-2020-15962 https://nvd.nist.gov/vuln/detail/CVE-2020-15962 [ 9 ] CVE-2020-15963 https://nvd.nist.gov/vuln/detail/CVE-2020-15963 [ 10 ] CVE-2020-15963 https://nvd.nist.gov/vuln/detail/CVE-2020-15963 [ 11 ] CVE-2020-15964 https://nvd.nist.gov/vuln/detail/CVE-2020-15964 [ 12 ] CVE-2020-15964 https://nvd.nist.gov/vuln/detail/CVE-2020-15964 [ 13 ] CVE-2020-15965 https://nvd.nist.gov/vuln/detail/CVE-2020-15965 [ 14 ] CVE-2020-15965 https://nvd.nist.gov/vuln/detail/CVE-2020-15965 [ 15 ] CVE-2020-15966 https://nvd.nist.gov/vuln/detail/CVE-2020-15966 [ 16 ] CVE-2020-15966 https://nvd.nist.gov/vuln/detail/CVE-2020-15966 [ 17 ] CVE-2020-15968 https://nvd.nist.gov/vuln/detail/CVE-2020-15968 [ 18 ] CVE-2020-15968 https://nvd.nist.gov/vuln/detail/CVE-2020-15968 [ 19 ] CVE-2020-15969 https://nvd.nist.gov/vuln/detail/CVE-2020-15969 [ 20 ] CVE-2020-15969 https://nvd.nist.gov/vuln/detail/CVE-2020-15969 [ 21 ] CVE-2020-15972 https://nvd.nist.gov/vuln/detail/CVE-2020-15972 [ 22 ] CVE-2020-15972 https://nvd.nist.gov/vuln/detail/CVE-2020-15972 [ 23 ] CVE-2020-15974 https://nvd.nist.gov/vuln/detail/CVE-2020-15974 [ 24 ] CVE-2020-15974 https://nvd.nist.gov/vuln/detail/CVE-2020-15974 [ 25 ] CVE-2020-15976 https://nvd.nist.gov/vuln/detail/CVE-2020-15976 [ 26 ] CVE-2020-15976 https://nvd.nist.gov/vuln/detail/CVE-2020-15976 [ 27 ] CVE-2020-15977 https://nvd.nist.gov/vuln/detail/CVE-2020-15977 [ 28 ] CVE-2020-15977 https://nvd.nist.gov/vuln/detail/CVE-2020-15977 [ 29 ] CVE-2020-15978 https://nvd.nist.gov/vuln/detail/CVE-2020-15978 [ 30 ] CVE-2020-15978 https://nvd.nist.gov/vuln/detail/CVE-2020-15978 [ 31 ] CVE-2020-15979 https://nvd.nist.gov/vuln/detail/CVE-2020-15979 [ 32 ] CVE-2020-15979 https://nvd.nist.gov/vuln/detail/CVE-2020-15979 [ 33 ] CVE-2020-15985 https://nvd.nist.gov/vuln/detail/CVE-2020-15985 [ 34 ] CVE-2020-15985 https://nvd.nist.gov/vuln/detail/CVE-2020-15985 [ 35 ] CVE-2020-15987 https://nvd.nist.gov/vuln/detail/CVE-2020-15987 [ 36 ] CVE-2020-15987 https://nvd.nist.gov/vuln/detail/CVE-2020-15987 [ 37 ] CVE-2020-15989 https://nvd.nist.gov/vuln/detail/CVE-2020-15989 [ 38 ] CVE-2020-15989 https://nvd.nist.gov/vuln/detail/CVE-2020-15989 [ 39 ] CVE-2020-15992 https://nvd.nist.gov/vuln/detail/CVE-2020-15992 [ 40 ] CVE-2020-15992 https://nvd.nist.gov/vuln/detail/CVE-2020-15992 [ 41 ] CVE-2020-16001 https://nvd.nist.gov/vuln/detail/CVE-2020-16001 [ 42 ] CVE-2020-16001 https://nvd.nist.gov/vuln/detail/CVE-2020-16001 [ 43 ] CVE-2020-16002 https://nvd.nist.gov/vuln/detail/CVE-2020-16002 [ 44 ] CVE-2020-16002 https://nvd.nist.gov/vuln/detail/CVE-2020-16002 [ 45 ] CVE-2020-16003 https://nvd.nist.gov/vuln/detail/CVE-2020-16003 [ 46 ] CVE-2020-16003 https://nvd.nist.gov/vuln/detail/CVE-2020-16003 [ 47 ] CVE-2020-6467 https://nvd.nist.gov/vuln/detail/CVE-2020-6467 [ 48 ] CVE-2020-6467 https://nvd.nist.gov/vuln/detail/CVE-2020-6467 [ 49 ] CVE-2020-6470 https://nvd.nist.gov/vuln/detail/CVE-2020-6470 [ 50 ] CVE-2020-6470 https://nvd.nist.gov/vuln/detail/CVE-2020-6470 [ 51 ] CVE-2020-6471 https://nvd.nist.gov/vuln/detail/CVE-2020-6471 [ 52 ] CVE-2020-6471 https://nvd.nist.gov/vuln/detail/CVE-2020-6471 [ 53 ] CVE-2020-6472 https://nvd.nist.gov/vuln/detail/CVE-2020-6472 [ 54 ] CVE-2020-6473 https://nvd.nist.gov/vuln/detail/CVE-2020-6473 [ 55 ] CVE-2020-6474 https://nvd.nist.gov/vuln/detail/CVE-2020-6474 [ 56 ] CVE-2020-6475 https://nvd.nist.gov/vuln/detail/CVE-2020-6475 [ 57 ] CVE-2020-6476 https://nvd.nist.gov/vuln/detail/CVE-2020-6476 [ 58 ] CVE-2020-6480 https://nvd.nist.gov/vuln/detail/CVE-2020-6480 [ 59 ] CVE-2020-6481 https://nvd.nist.gov/vuln/detail/CVE-2020-6481 [ 60 ] CVE-2020-6482 https://nvd.nist.gov/vuln/detail/CVE-2020-6482 [ 61 ] CVE-2020-6483 https://nvd.nist.gov/vuln/detail/CVE-2020-6483 [ 62 ] CVE-2020-6486 https://nvd.nist.gov/vuln/detail/CVE-2020-6486 [ 63 ] CVE-2020-6487 https://nvd.nist.gov/vuln/detail/CVE-2020-6487 [ 64 ] CVE-2020-6489 https://nvd.nist.gov/vuln/detail/CVE-2020-6489 [ 65 ] CVE-2020-6490 https://nvd.nist.gov/vuln/detail/CVE-2020-6490 [ 66 ] CVE-2020-6506 https://nvd.nist.gov/vuln/detail/CVE-2020-6506 [ 67 ] CVE-2020-6510 https://nvd.nist.gov/vuln/detail/CVE-2020-6510 [ 68 ] CVE-2020-6511 https://nvd.nist.gov/vuln/detail/CVE-2020-6511 [ 69 ] CVE-2020-6512 https://nvd.nist.gov/vuln/detail/CVE-2020-6512 [ 70 ] CVE-2020-6513 https://nvd.nist.gov/vuln/detail/CVE-2020-6513 [ 71 ] CVE-2020-6514 https://nvd.nist.gov/vuln/detail/CVE-2020-6514 [ 72 ] CVE-2020-6518 https://nvd.nist.gov/vuln/detail/CVE-2020-6518 [ 73 ] CVE-2020-6523 https://nvd.nist.gov/vuln/detail/CVE-2020-6523 [ 74 ] CVE-2020-6524 https://nvd.nist.gov/vuln/detail/CVE-2020-6524 [ 75 ] CVE-2020-6526 https://nvd.nist.gov/vuln/detail/CVE-2020-6526 [ 76 ] CVE-2020-6529 https://nvd.nist.gov/vuln/detail/CVE-2020-6529 [ 77 ] CVE-2020-6530 https://nvd.nist.gov/vuln/detail/CVE-2020-6530 [ 78 ] CVE-2020-6531 https://nvd.nist.gov/vuln/detail/CVE-2020-6531 [ 79 ] CVE-2020-6532 https://nvd.nist.gov/vuln/detail/CVE-2020-6532 [ 80 ] CVE-2020-6533 https://nvd.nist.gov/vuln/detail/CVE-2020-6533 [ 81 ] CVE-2020-6534 https://nvd.nist.gov/vuln/detail/CVE-2020-6534 [ 82 ] CVE-2020-6535 https://nvd.nist.gov/vuln/detail/CVE-2020-6535 [ 83 ] CVE-2020-6540 https://nvd.nist.gov/vuln/detail/CVE-2020-6540 [ 84 ] CVE-2020-6541 https://nvd.nist.gov/vuln/detail/CVE-2020-6541 [ 85 ] CVE-2020-6542 https://nvd.nist.gov/vuln/detail/CVE-2020-6542 [ 86 ] CVE-2020-6543 https://nvd.nist.gov/vuln/detail/CVE-2020-6543 [ 87 ] CVE-2020-6544 https://nvd.nist.gov/vuln/detail/CVE-2020-6544 [ 88 ] CVE-2020-6545 https://nvd.nist.gov/vuln/detail/CVE-2020-6545 [ 89 ] CVE-2020-6548 https://nvd.nist.gov/vuln/detail/CVE-2020-6548 [ 90 ] CVE-2020-6549 https://nvd.nist.gov/vuln/detail/CVE-2020-6549 [ 91 ] CVE-2020-6550 https://nvd.nist.gov/vuln/detail/CVE-2020-6550 [ 92 ] CVE-2020-6551 https://nvd.nist.gov/vuln/detail/CVE-2020-6551 [ 93 ] CVE-2020-6555 https://nvd.nist.gov/vuln/detail/CVE-2020-6555 [ 94 ] CVE-2020-6557 https://nvd.nist.gov/vuln/detail/CVE-2020-6557 [ 95 ] CVE-2020-6559 https://nvd.nist.gov/vuln/detail/CVE-2020-6559 [ 96 ] CVE-2020-6561 https://nvd.nist.gov/vuln/detail/CVE-2020-6561 [ 97 ] CVE-2020-6562 https://nvd.nist.gov/vuln/detail/CVE-2020-6562 [ 98 ] CVE-2020-6569 https://nvd.nist.gov/vuln/detail/CVE-2020-6569 [ 99 ] CVE-2020-6570 https://nvd.nist.gov/vuln/detail/CVE-2020-6570 [ 100 ] CVE-2020-6571 https://nvd.nist.gov/vuln/detail/CVE-2020-6571 [ 101 ] CVE-2020-6573 https://nvd.nist.gov/vuln/detail/CVE-2020-6573 [ 102 ] CVE-2020-6575 https://nvd.nist.gov/vuln/detail/CVE-2020-6575 [ 103 ] CVE-2020-6576 https://nvd.nist.gov/vuln/detail/CVE-2020-6576 Availability =========== This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/202101-30 Concerns? ======== Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ====== Copyright 2021 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. https://creativecommons.org/licenses/by-sa/2.5 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-2020-12-14-1 iOS 14.3 and iPadOS 14.3 iOS 14.3 and iPadOS 14.3 addresses the following issues. CVE-2020-15969: an anonymous researcher Installation note: This update is available through iTunes and Software Update on your iOS device, and will not appear in your computer's Software Update application, or in the Apple Downloads site. Make sure you have an Internet connection and have installed the latest version of iTunes from https://www.apple.com/itunes/ iTunes and Software Update on the device will automatically check Apple's update server on its weekly schedule. When an update is detected, it is downloaded and the option to be installed is presented to the user when the iOS device is docked. We recommend applying the update immediately if possible. Selecting Don't Install will present the option the next time you connect your iOS device. The automatic update process may take up to a week depending on the day that iTunes or the device checks for updates. You may manually obtain the update via the Check for Updates button within iTunes, or the Software Update on your device. To check that the iPhone, iPod touch, or iPad has been updated: * Navigate to Settings * Select General * Select About. CVE-2020-15969: an anonymous researcher Installation note: Safari 14.0.2 may be obtained from the Mac App Store. 8.1) - ppc64le, x86_64 3. Summary: An update for firefox is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 78.4.0 ESR. Security Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4 (CVE-2020-15683) * chromium-browser: Use after free in WebRTC (CVE-2020-15969) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, Firefox must be restarted for the changes to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1885885 - CVE-2020-15969 chromium-browser: Use after free in WebRTC 1889932 - CVE-2020-15683 Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: firefox-78.4.0-1.el7_9.src.rpm x86_64: firefox-78.4.0-1.el7_9.x86_64.rpm firefox-debuginfo-78.4.0-1.el7_9.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: firefox-78.4.0-1.el7_9.i686.rpm Red Hat Enterprise Linux Server (v. 7): Source: firefox-78.4.0-1.el7_9.src.rpm ppc64: firefox-78.4.0-1.el7_9.ppc64.rpm firefox-debuginfo-78.4.0-1.el7_9.ppc64.rpm ppc64le: firefox-78.4.0-1.el7_9.ppc64le.rpm firefox-debuginfo-78.4.0-1.el7_9.ppc64le.rpm s390x: firefox-78.4.0-1.el7_9.s390x.rpm firefox-debuginfo-78.4.0-1.el7_9.s390x.rpm x86_64: firefox-78.4.0-1.el7_9.x86_64.rpm firefox-debuginfo-78.4.0-1.el7_9.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): x86_64: firefox-78.4.0-1.el7_9.i686.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: firefox-78.4.0-1.el7_9.src.rpm x86_64: firefox-78.4.0-1.el7_9.x86_64.rpm firefox-debuginfo-78.4.0-1.el7_9.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: firefox-78.4.0-1.el7_9.i686.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2020-15683 https://access.redhat.com/security/cve/CVE-2020-15969 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2020 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBX5G+ntzjgjWX9erEAQhmDQ//dHDny/ImuLP8xvK4PtLEY7BRvrOS/vY2 YkKEGdGOQa48sBw+5Y2tSqra5gKOqf5H3lcxj+sTG97hUStgrNAucZpTHaKm7vde /Eb3PIFWOqnNpcvDg6njU/q5ttA7YC0PHizRfH0Yix5EUAkKZnMWlcS8Lkm5FEM2 Ws+UfvgB/+Gx03I2MioDwnnHnnZLR+pmt7EYl7CnKLRMYsQVEkrlc2b7gCzPlijo UV91wcUoX4s9/v/i2afTY8CqhDs8MNHFnsVX+FTCyGbezamAxJ+YTKtDgKDiG+7v up2fIlMhf8eKnkEpyOebDDPo8vECJr311rXT0qg6/jkx9iogOyHskOcmTYIK5xzT R9gmF+gvsJsMeHzD6a6uh5BsLLS7rtIESWO91IS0FofOAv0lkkOqG1xlAq4zAKYc 8NrzZ0omzrB9rRK2LeKp2oAP0xIoFQiTmicoBAvRijNPRSWT8SZY/IfOsSvrbfkG rGOY4nNaLVQUqXv7+BKa/LusfBhQkGgxcKO/uNX7xWGTEqH4ysx7/ELKmQ1LjZxw bgYhrYaSkSMAQ5r/Nf0qMHLLxvMUqmJmgkExE0rLwogxWVYZWVCiIwI0wncDCFEo mw8HZ58JlTWTv2owGc8I0fo+ln7Y5xmuXuyN6AldueladP0AdtdNyaw/GHquCytW o2ukWK2zUE8=oczW -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . For the stable distribution (buster), these problems have been fixed in version 78.4.0esr-1~deb10u2. We recommend that you upgrade your firefox-esr packages

Trust: 2.61

sources: NVD: CVE-2020-15969 // JVNDB: JVNDB-2020-013002 // VULHUB: VHN-169000 // PACKETSTORM: 159910 // PACKETSTORM: 159679 // PACKETSTORM: 160538 // PACKETSTORM: 161131 // PACKETSTORM: 160536 // PACKETSTORM: 160543 // PACKETSTORM: 159909 // PACKETSTORM: 159682 // PACKETSTORM: 168916 // PACKETSTORM: 168919

AFFECTED PRODUCTS

vendor:fedoraprojectmodel:fedorascope:eqversion:32

Trust: 1.0

vendor:googlemodel:chromescope:ltversion:86.0.4240.75

Trust: 1.0

vendor:applemodel:tvosscope:ltversion:14.3

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:31

Trust: 1.0

vendor:applemodel:safariscope:ltversion:14.0.2

Trust: 1.0

vendor:opensusemodel:backports slescope:eqversion:15.0

Trust: 1.0

vendor:applemodel:iphone osscope:ltversion:14.3

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:10.0

Trust: 1.0

vendor:applemodel:macosscope:ltversion:11.1

Trust: 1.0

vendor:applemodel:ipadosscope:ltversion:14.3

Trust: 1.0

vendor:applemodel:watchosscope:ltversion:7.2

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:33

Trust: 1.0

vendor:アップルmodel:watchosscope: - version: -

Trust: 0.8

vendor:アップルmodel:iosscope: - version: -

Trust: 0.8

vendor:アップルmodel:ipadosscope: - version: -

Trust: 0.8

vendor:opensusemodel:backports slescope: - version: -

Trust: 0.8

vendor:アップルmodel:macos big surscope: - version: -

Trust: 0.8

vendor:debianmodel:gnu/linuxscope: - version: -

Trust: 0.8

vendor:fedoramodel:fedorascope: - version: -

Trust: 0.8

vendor:アップルmodel:safariscope: - version: -

Trust: 0.8

vendor:アップルmodel:tvosscope: - version: -

Trust: 0.8

vendor:googlemodel:chromescope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2020-013002 // NVD: CVE-2020-15969

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-15969
value: HIGH

Trust: 1.0

NVD: CVE-2020-15969
value: HIGH

Trust: 0.8

VULHUB: VHN-169000
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2020-15969
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-169000
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-15969
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2020-15969
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-169000 // JVNDB: JVNDB-2020-013002 // NVD: CVE-2020-15969

PROBLEMTYPE DATA

problemtype:CWE-416

Trust: 1.1

problemtype:CWE-787

Trust: 1.1

problemtype:Use of freed memory (CWE-416) [NVD Evaluation ]

Trust: 0.8

sources: VULHUB: VHN-169000 // JVNDB: JVNDB-2020-013002 // NVD: CVE-2020-15969

TYPE

arbitrary

Trust: 0.3

sources: PACKETSTORM: 161131 // PACKETSTORM: 168916 // PACKETSTORM: 168919

PATCH

title:HT212011url:https://www.debian.org/security/2021/dsa-4824

Trust: 0.8

sources: JVNDB: JVNDB-2020-013002

EXTERNAL IDS

db:NVDid:CVE-2020-15969

Trust: 2.9

db:JVNDBid:JVNDB-2020-013002

Trust: 0.8

db:PACKETSTORMid:159909

Trust: 0.2

db:PACKETSTORMid:160538

Trust: 0.2

db:PACKETSTORMid:159910

Trust: 0.2

db:PACKETSTORMid:160543

Trust: 0.2

db:PACKETSTORMid:161131

Trust: 0.2

db:PACKETSTORMid:159679

Trust: 0.2

db:PACKETSTORMid:160536

Trust: 0.2

db:PACKETSTORMid:159682

Trust: 0.2

db:PACKETSTORMid:159893

Trust: 0.1

db:PACKETSTORMid:159683

Trust: 0.1

db:PACKETSTORMid:159695

Trust: 0.1

db:PACKETSTORMid:159906

Trust: 0.1

db:PACKETSTORMid:159587

Trust: 0.1

db:PACKETSTORMid:159536

Trust: 0.1

db:PACKETSTORMid:160542

Trust: 0.1

db:PACKETSTORMid:159907

Trust: 0.1

db:PACKETSTORMid:160540

Trust: 0.1

db:PACKETSTORMid:159888

Trust: 0.1

db:PACKETSTORMid:159686

Trust: 0.1

db:PACKETSTORMid:159746

Trust: 0.1

db:VULHUBid:VHN-169000

Trust: 0.1

db:PACKETSTORMid:168916

Trust: 0.1

db:PACKETSTORMid:168919

Trust: 0.1

sources: VULHUB: VHN-169000 // JVNDB: JVNDB-2020-013002 // PACKETSTORM: 159910 // PACKETSTORM: 159679 // PACKETSTORM: 160538 // PACKETSTORM: 161131 // PACKETSTORM: 160536 // PACKETSTORM: 160543 // PACKETSTORM: 159909 // PACKETSTORM: 159682 // PACKETSTORM: 168916 // PACKETSTORM: 168919 // NVD: CVE-2020-15969

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2020-15969

Trust: 1.8

url:https://security.gentoo.org/glsa/202101-30

Trust: 1.2

url:https://support.apple.com/kb/ht212003

Trust: 1.1

url:https://support.apple.com/kb/ht212005

Trust: 1.1

url:https://support.apple.com/kb/ht212007

Trust: 1.1

url:https://support.apple.com/kb/ht212009

Trust: 1.1

url:https://support.apple.com/kb/ht212011

Trust: 1.1

url:https://www.debian.org/security/2021/dsa-4824

Trust: 1.1

url:http://seclists.org/fulldisclosure/2020/dec/24

Trust: 1.1

url:http://seclists.org/fulldisclosure/2020/dec/26

Trust: 1.1

url:http://seclists.org/fulldisclosure/2020/dec/27

Trust: 1.1

url:http://seclists.org/fulldisclosure/2020/dec/29

Trust: 1.1

url:http://seclists.org/fulldisclosure/2020/dec/30

Trust: 1.1

url:https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html

Trust: 1.1

url:https://crbug.com/1124659

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html

Trust: 1.1

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/24qfl4c3azkmfvl7lvsymu2dne5vvugs/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4gwcwnhttyoh6hsfuxpgpbb6j6jyzhze/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/sc3u3h6aisvzb5plzllnf4hmq4uffl7m/

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2020-15683

Trust: 0.6

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2020-15683

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2020-15969

Trust: 0.4

url:https://bugzilla.redhat.com/):

Trust: 0.4

url:https://access.redhat.com/security/team/key/

Trust: 0.4

url:https://access.redhat.com/articles/11258

Trust: 0.4

url:https://access.redhat.com/security/team/contact/

Trust: 0.4

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.4

url:https://www.apple.com/support/security/pgp/

Trust: 0.3

url:https://www.debian.org/security/faq

Trust: 0.2

url:https://www.debian.org/security/

Trust: 0.2

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4gwcwnhttyoh6hsfuxpgpbb6j6jyzhze/

Trust: 0.1

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/sc3u3h6aisvzb5plzllnf4hmq4uffl7m/

Trust: 0.1

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/24qfl4c3azkmfvl7lvsymu2dne5vvugs/

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:4947

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:4311

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-10014

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-13524

Trust: 0.1

url:https://support.apple.com/kb/ht201222

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-27903

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-10016

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-27910

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-27897

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-27907

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-10015

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-10017

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-27912

Trust: 0.1

url:https://support.apple.com/downloads/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-27901

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-27896

Trust: 0.1

url:https://support.apple.com/ht212011.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-27898

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-27914

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-27908

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-27911

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-10009

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-27915

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-10004

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-10002

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-27916

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-10010

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-10012

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-27906

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-10007

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6472

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15966

Trust: 0.1

url:https://security.gentoo.org/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6506

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6467

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6534

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6545

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6571

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6514

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6482

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6532

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6475

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6540

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6470

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6511

Trust: 0.1

url:https://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6559

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6471

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15972

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6576

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15961

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15977

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-16002

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6573

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15978

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6549

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15965

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6487

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6569

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15992

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6510

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15963

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6551

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6486

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-16001

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15968

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6483

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6490

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15960

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15979

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15989

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-16003

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15987

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6531

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6476

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6480

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6524

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15974

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6548

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6555

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6535

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6550

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6562

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15976

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6543

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6474

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6533

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6523

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6575

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6542

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15964

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6489

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6526

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6518

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6512

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6481

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6557

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6513

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6544

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15985

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6530

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6473

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15962

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6561

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15959

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6570

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6529

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6541

Trust: 0.1

url:https://www.apple.com/itunes/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-27948

Trust: 0.1

url:https://support.apple.com/ht212003.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-27943

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-27946

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-27951

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-29613

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-29618

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-29611

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-29619

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-29617

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-27944

Trust: 0.1

url:https://support.apple.com/ht212007.

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:4945

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:4310

Trust: 0.1

url:https://security-tracker.debian.org/tracker/firefox-esr

Trust: 0.1

url:https://security-tracker.debian.org/tracker/thunderbird

Trust: 0.1

sources: VULHUB: VHN-169000 // JVNDB: JVNDB-2020-013002 // PACKETSTORM: 159910 // PACKETSTORM: 159679 // PACKETSTORM: 160538 // PACKETSTORM: 161131 // PACKETSTORM: 160536 // PACKETSTORM: 160543 // PACKETSTORM: 159909 // PACKETSTORM: 159682 // PACKETSTORM: 168916 // PACKETSTORM: 168919 // NVD: CVE-2020-15969

CREDITS

Red Hat

Trust: 0.4

sources: PACKETSTORM: 159910 // PACKETSTORM: 159679 // PACKETSTORM: 159909 // PACKETSTORM: 159682

SOURCES

db:VULHUBid:VHN-169000
db:JVNDBid:JVNDB-2020-013002
db:PACKETSTORMid:159910
db:PACKETSTORMid:159679
db:PACKETSTORMid:160538
db:PACKETSTORMid:161131
db:PACKETSTORMid:160536
db:PACKETSTORMid:160543
db:PACKETSTORMid:159909
db:PACKETSTORMid:159682
db:PACKETSTORMid:168916
db:PACKETSTORMid:168919
db:NVDid:CVE-2020-15969

LAST UPDATE DATE

2024-09-17T22:47:10.116000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-169000date:2021-07-21T00:00:00
db:JVNDBid:JVNDB-2020-013002date:2021-06-16T09:01:00
db:NVDid:CVE-2020-15969date:2023-11-07T03:17:58.410

SOURCES RELEASE DATE

db:VULHUBid:VHN-169000date:2020-11-03T00:00:00
db:JVNDBid:JVNDB-2020-013002date:2021-06-16T00:00:00
db:PACKETSTORMid:159910date:2020-11-05T17:01:22
db:PACKETSTORMid:159679date:2020-10-22T17:19:42
db:PACKETSTORMid:160538date:2020-12-16T17:58:29
db:PACKETSTORMid:161131date:2021-01-26T14:27:32
db:PACKETSTORMid:160536date:2020-12-16T17:56:45
db:PACKETSTORMid:160543date:2020-12-16T18:03:10
db:PACKETSTORMid:159909date:2020-11-05T17:01:15
db:PACKETSTORMid:159682date:2020-10-22T23:55:44
db:PACKETSTORMid:168916date:2020-10-28T19:12:00
db:PACKETSTORMid:168919date:2020-10-28T19:12:00
db:NVDid:CVE-2020-15969date:2020-11-03T03:15:12.790