opensuse-su-2020:0540-1
Vulnerability from csaf_opensuse
Published
2020-04-18 22:10
Modified
2020-04-18 22:10
Summary
Security update for chromium
Notes
Title of the patch
Security update for chromium
Description of the patch
This update for chromium fixes the following issues:
Chromium was updated to 81.0.4044.92 boo#1168911:
* CVE-2020-6454: Use after free in extensions
* CVE-2020-6423: Use after free in audio
* CVE-2020-6455: Out of bounds read in WebSQL
* CVE-2020-6430: Type Confusion in V8
* CVE-2020-6456: Insufficient validation of untrusted input in clipboard
* CVE-2020-6431: Insufficient policy enforcement in full screen
* CVE-2020-6432: Insufficient policy enforcement in navigations
* CVE-2020-6433: Insufficient policy enforcement in extensions
* CVE-2020-6434: Use after free in devtools
* CVE-2020-6435: Insufficient policy enforcement in extensions
* CVE-2020-6436: Use after free in window management
* CVE-2020-6437: Inappropriate implementation in WebView
* CVE-2020-6438: Insufficient policy enforcement in extensions
* CVE-2020-6439: Insufficient policy enforcement in navigations
* CVE-2020-6440: Inappropriate implementation in extensions
* CVE-2020-6441: Insufficient policy enforcement in omnibox
* CVE-2020-6442: Inappropriate implementation in cache
* CVE-2020-6443: Insufficient data validation in developer tools
* CVE-2020-6444: Uninitialized Use in WebRTC
* CVE-2020-6445: Insufficient policy enforcement in trusted types
* CVE-2020-6446: Insufficient policy enforcement in trusted types
* CVE-2020-6447: Inappropriate implementation in developer tools
* CVE-2020-6448: Use after free in V8
Chromium was updated to 80.0.3987.162 boo#1168421:
* CVE-2020-6450: Use after free in WebAudio.
* CVE-2020-6451: Use after free in WebAudio.
* CVE-2020-6452: Heap buffer overflow in media.
- Use a symbolic icon for GNOME
This update was imported from the openSUSE:Leap:15.1:Update update project.
Patchnames
openSUSE-2020-540
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for chromium",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for chromium fixes the following issues:\n\nChromium was updated to 81.0.4044.92 boo#1168911:\n\n * CVE-2020-6454: Use after free in extensions\n * CVE-2020-6423: Use after free in audio\n * CVE-2020-6455: Out of bounds read in WebSQL\n * CVE-2020-6430: Type Confusion in V8\n * CVE-2020-6456: Insufficient validation of untrusted input in clipboard\n * CVE-2020-6431: Insufficient policy enforcement in full screen\n * CVE-2020-6432: Insufficient policy enforcement in navigations\n * CVE-2020-6433: Insufficient policy enforcement in extensions\n * CVE-2020-6434: Use after free in devtools\n * CVE-2020-6435: Insufficient policy enforcement in extensions\n * CVE-2020-6436: Use after free in window management\n * CVE-2020-6437: Inappropriate implementation in WebView\n * CVE-2020-6438: Insufficient policy enforcement in extensions\n * CVE-2020-6439: Insufficient policy enforcement in navigations\n * CVE-2020-6440: Inappropriate implementation in extensions\n * CVE-2020-6441: Insufficient policy enforcement in omnibox\n * CVE-2020-6442: Inappropriate implementation in cache\n * CVE-2020-6443: Insufficient data validation in developer tools\n * CVE-2020-6444: Uninitialized Use in WebRTC\n * CVE-2020-6445: Insufficient policy enforcement in trusted types\n * CVE-2020-6446: Insufficient policy enforcement in trusted types\n * CVE-2020-6447: Inappropriate implementation in developer tools\n * CVE-2020-6448: Use after free in V8\n\nChromium was updated to 80.0.3987.162 boo#1168421:\n\n * CVE-2020-6450: Use after free in WebAudio.\n * CVE-2020-6451: Use after free in WebAudio.\n * CVE-2020-6452: Heap buffer overflow in media.\n\n- Use a symbolic icon for GNOME\n\n\nThis update was imported from the openSUSE:Leap:15.1:Update update project.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2020-540",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_0540-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2020:0540-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IAAT3MZYTALQ3ILCHMGAM3ZF7UWCYRNX/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2020:0540-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IAAT3MZYTALQ3ILCHMGAM3ZF7UWCYRNX/"
},
{
"category": "self",
"summary": "SUSE Bug 1167465",
"url": "https://bugzilla.suse.com/1167465"
},
{
"category": "self",
"summary": "SUSE Bug 1168421",
"url": "https://bugzilla.suse.com/1168421"
},
{
"category": "self",
"summary": "SUSE Bug 1168911",
"url": "https://bugzilla.suse.com/1168911"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6423 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6423/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6430 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6430/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6431 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6431/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6432 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6432/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6433 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6433/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6434 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6434/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6435 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6435/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6436 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6436/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6437 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6437/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6438 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6438/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6439 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6439/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6440 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6440/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6441 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6441/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6442 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6442/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6443 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6443/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6444 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6444/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6445 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6445/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6446 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6446/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6447 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6447/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6448 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6448/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6450 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6450/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6451 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6451/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6452 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6452/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6454 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6454/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6455 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6455/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6456 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6456/"
}
],
"title": "Security update for chromium",
"tracking": {
"current_release_date": "2020-04-18T22:10:02Z",
"generator": {
"date": "2020-04-18T22:10:02Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2020:0540-1",
"initial_release_date": "2020-04-18T22:10:02Z",
"revision_history": [
{
"date": "2020-04-18T22:10:02Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"product": {
"name": "chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"product_id": "chromedriver-81.0.4044.92-bp151.3.66.1.aarch64"
}
},
{
"category": "product_version",
"name": "chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"product": {
"name": "chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"product_id": "chromium-81.0.4044.92-bp151.3.66.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"product": {
"name": "chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"product_id": "chromedriver-81.0.4044.92-bp151.3.66.1.x86_64"
}
},
{
"category": "product_version",
"name": "chromium-81.0.4044.92-bp151.3.66.1.x86_64",
"product": {
"name": "chromium-81.0.4044.92-bp151.3.66.1.x86_64",
"product_id": "chromium-81.0.4044.92-bp151.3.66.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Package Hub 15 SP1",
"product": {
"name": "SUSE Package Hub 15 SP1",
"product_id": "SUSE Package Hub 15 SP1"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-81.0.4044.92-bp151.3.66.1.aarch64 as component of SUSE Package Hub 15 SP1",
"product_id": "SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64"
},
"product_reference": "chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-81.0.4044.92-bp151.3.66.1.x86_64 as component of SUSE Package Hub 15 SP1",
"product_id": "SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64"
},
"product_reference": "chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-81.0.4044.92-bp151.3.66.1.aarch64 as component of SUSE Package Hub 15 SP1",
"product_id": "SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64"
},
"product_reference": "chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-81.0.4044.92-bp151.3.66.1.x86_64 as component of SUSE Package Hub 15 SP1",
"product_id": "SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
},
"product_reference": "chromium-81.0.4044.92-bp151.3.66.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15 SP1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-6423",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6423"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in audio in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6423",
"url": "https://www.suse.com/security/cve/CVE-2020-6423"
},
{
"category": "external",
"summary": "SUSE Bug 1168911 for CVE-2020-6423",
"url": "https://bugzilla.suse.com/1168911"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-04-18T22:10:02Z",
"details": "important"
}
],
"title": "CVE-2020-6423"
},
{
"cve": "CVE-2020-6430",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6430"
}
],
"notes": [
{
"category": "general",
"text": "Type Confusion in V8 in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6430",
"url": "https://www.suse.com/security/cve/CVE-2020-6430"
},
{
"category": "external",
"summary": "SUSE Bug 1168911 for CVE-2020-6430",
"url": "https://bugzilla.suse.com/1168911"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-04-18T22:10:02Z",
"details": "important"
}
],
"title": "CVE-2020-6430"
},
{
"cve": "CVE-2020-6431",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6431"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in full screen in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to spoof security UI via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6431",
"url": "https://www.suse.com/security/cve/CVE-2020-6431"
},
{
"category": "external",
"summary": "SUSE Bug 1168911 for CVE-2020-6431",
"url": "https://bugzilla.suse.com/1168911"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-04-18T22:10:02Z",
"details": "important"
}
],
"title": "CVE-2020-6431"
},
{
"cve": "CVE-2020-6432",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6432"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in navigations in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6432",
"url": "https://www.suse.com/security/cve/CVE-2020-6432"
},
{
"category": "external",
"summary": "SUSE Bug 1168911 for CVE-2020-6432",
"url": "https://bugzilla.suse.com/1168911"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-04-18T22:10:02Z",
"details": "important"
}
],
"title": "CVE-2020-6432"
},
{
"cve": "CVE-2020-6433",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6433"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in extensions in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6433",
"url": "https://www.suse.com/security/cve/CVE-2020-6433"
},
{
"category": "external",
"summary": "SUSE Bug 1168911 for CVE-2020-6433",
"url": "https://bugzilla.suse.com/1168911"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-04-18T22:10:02Z",
"details": "important"
}
],
"title": "CVE-2020-6433"
},
{
"cve": "CVE-2020-6434",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6434"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in devtools in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6434",
"url": "https://www.suse.com/security/cve/CVE-2020-6434"
},
{
"category": "external",
"summary": "SUSE Bug 1168911 for CVE-2020-6434",
"url": "https://bugzilla.suse.com/1168911"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-04-18T22:10:02Z",
"details": "important"
}
],
"title": "CVE-2020-6434"
},
{
"cve": "CVE-2020-6435",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6435"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in extensions in Google Chrome prior to 81.0.4044.92 allowed a remote attacker who had compromised the renderer process to bypass navigation restrictions via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6435",
"url": "https://www.suse.com/security/cve/CVE-2020-6435"
},
{
"category": "external",
"summary": "SUSE Bug 1168911 for CVE-2020-6435",
"url": "https://bugzilla.suse.com/1168911"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-04-18T22:10:02Z",
"details": "important"
}
],
"title": "CVE-2020-6435"
},
{
"cve": "CVE-2020-6436",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6436"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in window management in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6436",
"url": "https://www.suse.com/security/cve/CVE-2020-6436"
},
{
"category": "external",
"summary": "SUSE Bug 1168911 for CVE-2020-6436",
"url": "https://bugzilla.suse.com/1168911"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-04-18T22:10:02Z",
"details": "important"
}
],
"title": "CVE-2020-6436"
},
{
"cve": "CVE-2020-6437",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6437"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in WebView in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to spoof security UI via a crafted application.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6437",
"url": "https://www.suse.com/security/cve/CVE-2020-6437"
},
{
"category": "external",
"summary": "SUSE Bug 1168911 for CVE-2020-6437",
"url": "https://bugzilla.suse.com/1168911"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-04-18T22:10:02Z",
"details": "important"
}
],
"title": "CVE-2020-6437"
},
{
"cve": "CVE-2020-6438",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6438"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in extensions in Google Chrome prior to 81.0.4044.92 allowed an attacker who convinced a user to install a malicious extension to obtain potentially sensitive information from process memory via a crafted Chrome Extension.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6438",
"url": "https://www.suse.com/security/cve/CVE-2020-6438"
},
{
"category": "external",
"summary": "SUSE Bug 1168911 for CVE-2020-6438",
"url": "https://bugzilla.suse.com/1168911"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-04-18T22:10:02Z",
"details": "important"
}
],
"title": "CVE-2020-6438"
},
{
"cve": "CVE-2020-6439",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6439"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in navigations in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to bypass security UI via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6439",
"url": "https://www.suse.com/security/cve/CVE-2020-6439"
},
{
"category": "external",
"summary": "SUSE Bug 1168911 for CVE-2020-6439",
"url": "https://bugzilla.suse.com/1168911"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-04-18T22:10:02Z",
"details": "important"
}
],
"title": "CVE-2020-6439"
},
{
"cve": "CVE-2020-6440",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6440"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in extensions in Google Chrome prior to 81.0.4044.92 allowed an attacker who convinced a user to install a malicious extension to obtain potentially sensitive information via a crafted Chrome Extension.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6440",
"url": "https://www.suse.com/security/cve/CVE-2020-6440"
},
{
"category": "external",
"summary": "SUSE Bug 1168911 for CVE-2020-6440",
"url": "https://bugzilla.suse.com/1168911"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-04-18T22:10:02Z",
"details": "important"
}
],
"title": "CVE-2020-6440"
},
{
"cve": "CVE-2020-6441",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6441"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in omnibox in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to bypass security UI via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6441",
"url": "https://www.suse.com/security/cve/CVE-2020-6441"
},
{
"category": "external",
"summary": "SUSE Bug 1168911 for CVE-2020-6441",
"url": "https://bugzilla.suse.com/1168911"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-04-18T22:10:02Z",
"details": "important"
}
],
"title": "CVE-2020-6441"
},
{
"cve": "CVE-2020-6442",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6442"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in cache in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to leak cross-origin data via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6442",
"url": "https://www.suse.com/security/cve/CVE-2020-6442"
},
{
"category": "external",
"summary": "SUSE Bug 1168911 for CVE-2020-6442",
"url": "https://bugzilla.suse.com/1168911"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-04-18T22:10:02Z",
"details": "important"
}
],
"title": "CVE-2020-6442"
},
{
"cve": "CVE-2020-6443",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6443"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient data validation in developer tools in Google Chrome prior to 81.0.4044.92 allowed a remote attacker who had convinced the user to use devtools to execute arbitrary code via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6443",
"url": "https://www.suse.com/security/cve/CVE-2020-6443"
},
{
"category": "external",
"summary": "SUSE Bug 1168911 for CVE-2020-6443",
"url": "https://bugzilla.suse.com/1168911"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-04-18T22:10:02Z",
"details": "important"
}
],
"title": "CVE-2020-6443"
},
{
"cve": "CVE-2020-6444",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6444"
}
],
"notes": [
{
"category": "general",
"text": "Uninitialized use in WebRTC in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6444",
"url": "https://www.suse.com/security/cve/CVE-2020-6444"
},
{
"category": "external",
"summary": "SUSE Bug 1168911 for CVE-2020-6444",
"url": "https://bugzilla.suse.com/1168911"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-04-18T22:10:02Z",
"details": "important"
}
],
"title": "CVE-2020-6444"
},
{
"cve": "CVE-2020-6445",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6445"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in trusted types in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to bypass content security policy via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6445",
"url": "https://www.suse.com/security/cve/CVE-2020-6445"
},
{
"category": "external",
"summary": "SUSE Bug 1168911 for CVE-2020-6445",
"url": "https://bugzilla.suse.com/1168911"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-04-18T22:10:02Z",
"details": "important"
}
],
"title": "CVE-2020-6445"
},
{
"cve": "CVE-2020-6446",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6446"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in trusted types in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to bypass content security policy via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6446",
"url": "https://www.suse.com/security/cve/CVE-2020-6446"
},
{
"category": "external",
"summary": "SUSE Bug 1168911 for CVE-2020-6446",
"url": "https://bugzilla.suse.com/1168911"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-04-18T22:10:02Z",
"details": "important"
}
],
"title": "CVE-2020-6446"
},
{
"cve": "CVE-2020-6447",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6447"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in developer tools in Google Chrome prior to 81.0.4044.92 allowed a remote attacker who had convinced the user to use devtools to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6447",
"url": "https://www.suse.com/security/cve/CVE-2020-6447"
},
{
"category": "external",
"summary": "SUSE Bug 1168911 for CVE-2020-6447",
"url": "https://bugzilla.suse.com/1168911"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-04-18T22:10:02Z",
"details": "important"
}
],
"title": "CVE-2020-6447"
},
{
"cve": "CVE-2020-6448",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6448"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in V8 in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6448",
"url": "https://www.suse.com/security/cve/CVE-2020-6448"
},
{
"category": "external",
"summary": "SUSE Bug 1168911 for CVE-2020-6448",
"url": "https://bugzilla.suse.com/1168911"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-04-18T22:10:02Z",
"details": "important"
}
],
"title": "CVE-2020-6448"
},
{
"cve": "CVE-2020-6450",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6450"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in WebAudio in Google Chrome prior to 80.0.3987.162 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6450",
"url": "https://www.suse.com/security/cve/CVE-2020-6450"
},
{
"category": "external",
"summary": "SUSE Bug 1168421 for CVE-2020-6450",
"url": "https://bugzilla.suse.com/1168421"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-04-18T22:10:02Z",
"details": "important"
}
],
"title": "CVE-2020-6450"
},
{
"cve": "CVE-2020-6451",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6451"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in WebAudio in Google Chrome prior to 80.0.3987.162 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6451",
"url": "https://www.suse.com/security/cve/CVE-2020-6451"
},
{
"category": "external",
"summary": "SUSE Bug 1168421 for CVE-2020-6451",
"url": "https://bugzilla.suse.com/1168421"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-04-18T22:10:02Z",
"details": "important"
}
],
"title": "CVE-2020-6451"
},
{
"cve": "CVE-2020-6452",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6452"
}
],
"notes": [
{
"category": "general",
"text": "Heap buffer overflow in media in Google Chrome prior to 80.0.3987.162 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6452",
"url": "https://www.suse.com/security/cve/CVE-2020-6452"
},
{
"category": "external",
"summary": "SUSE Bug 1168421 for CVE-2020-6452",
"url": "https://bugzilla.suse.com/1168421"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-04-18T22:10:02Z",
"details": "important"
}
],
"title": "CVE-2020-6452"
},
{
"cve": "CVE-2020-6454",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6454"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in extensions in Google Chrome prior to 81.0.4044.92 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6454",
"url": "https://www.suse.com/security/cve/CVE-2020-6454"
},
{
"category": "external",
"summary": "SUSE Bug 1168911 for CVE-2020-6454",
"url": "https://bugzilla.suse.com/1168911"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-04-18T22:10:02Z",
"details": "important"
}
],
"title": "CVE-2020-6454"
},
{
"cve": "CVE-2020-6455",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6455"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds read in WebSQL in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6455",
"url": "https://www.suse.com/security/cve/CVE-2020-6455"
},
{
"category": "external",
"summary": "SUSE Bug 1168911 for CVE-2020-6455",
"url": "https://bugzilla.suse.com/1168911"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-04-18T22:10:02Z",
"details": "important"
}
],
"title": "CVE-2020-6455"
},
{
"cve": "CVE-2020-6456",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6456"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input in clipboard in Google Chrome prior to 81.0.4044.92 allowed a local attacker to bypass site isolation via crafted clipboard contents.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6456",
"url": "https://www.suse.com/security/cve/CVE-2020-6456"
},
{
"category": "external",
"summary": "SUSE Bug 1168911 for CVE-2020-6456",
"url": "https://bugzilla.suse.com/1168911"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-81.0.4044.92-bp151.3.66.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-81.0.4044.92-bp151.3.66.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-04-18T22:10:02Z",
"details": "important"
}
],
"title": "CVE-2020-6456"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…