Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
openSUSE:Leap:15.1:Update
patchinfo.13380
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.13380
<patchinfo incident="13380"> <issue tracker="bnc" id="1174189">VUL-0: CVE-2020-6510: chromium: Update to 84.0.4147.89</issue> <issue tracker="cve" id="2020-6517"/> <issue tracker="cve" id="2020-6522"/> <issue tracker="cve" id="2020-6536"/> <issue tracker="cve" id="2020-6525"/> <issue tracker="cve" id="2020-6512"/> <issue tracker="cve" id="2020-6528"/> <issue tracker="cve" id="2020-6513"/> <issue tracker="cve" id="2020-6534"/> <issue tracker="cve" id="2020-6527"/> <issue tracker="cve" id="2020-6531"/> <issue tracker="cve" id="2020-6520"/> <issue tracker="cve" id="2020-6511"/> <issue tracker="cve" id="2020-6526"/> <issue tracker="cve" id="2020-6535"/> <issue tracker="cve" id="2020-6533"/> <issue tracker="cve" id="2020-6524"/> <issue tracker="cve" id="2020-6519"/> <issue tracker="cve" id="2020-6516"/> <issue tracker="cve" id="2020-6518"/> <issue tracker="cve" id="2020-6529"/> <issue tracker="cve" id="2020-6515"/> <issue tracker="cve" id="2020-6521"/> <issue tracker="cve" id="2020-6523"/> <issue tracker="cve" id="2020-6510"/> <issue tracker="cve" id="2020-6514"/> <issue tracker="cve" id="2020-6530"/> <packager>scarabeus_iv</packager> <rating>important</rating> <category>security</category> <summary>Security update for chromium</summary> <description>This update for chromium fixes the following issues: - Update to 84.0.4147.89 boo#1174189: * Critical CVE-2020-6510: Heap buffer overflow in background fetch. * High CVE-2020-6511: Side-channel information leakage in content security policy. * High CVE-2020-6512: Type Confusion in V8. * High CVE-2020-6513: Heap buffer overflow in PDFium. * High CVE-2020-6514: Inappropriate implementation in WebRTC. * High CVE-2020-6515: Use after free in tab strip. * High CVE-2020-6516: Policy bypass in CORS. * High CVE-2020-6517: Heap buffer overflow in history. * Medium CVE-2020-6518: Use after free in developer tools. * Medium CVE-2020-6519: Policy bypass in CSP. * Medium CVE-2020-6520: Heap buffer overflow in Skia. * Medium CVE-2020-6521: Side-channel information leakage in autofill. * Medium CVE-2020-6522: Inappropriate implementation in external protocol handlers. * Medium CVE-2020-6523: Out of bounds write in Skia. * Medium CVE-2020-6524: Heap buffer overflow in WebAudio. * Medium CVE-2020-6525: Heap buffer overflow in Skia. * Low CVE-2020-6526: Inappropriate implementation in iframe sandbox. * Low CVE-2020-6527: Insufficient policy enforcement in CSP. * Low CVE-2020-6528: Incorrect security UI in basic auth. * Low CVE-2020-6529: Inappropriate implementation in WebRTC. * Low CVE-2020-6530: Out of bounds memory access in developer tools. * Low CVE-2020-6531: Side-channel information leakage in scroll to text. * Low CVE-2020-6533: Type Confusion in V8. * Low CVE-2020-6534: Heap buffer overflow in WebRTC. * Low CVE-2020-6535: Insufficient data validation in WebUI. * Low CVE-2020-6536: Incorrect security UI in PWAs. - Use bundled xcb-proto as we need to generate py2 bindings - Try to fix non-wayland build for Leap builds </description> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor