Executive Summary

Summary
Title chromium security update
Informations
Name DSA-4645 First vendor Publication 2020-03-22
Vendor Debian Last vendor Modification 2020-03-22
Severity (Vendor) N/A Revision 1

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Overall CVSS Score 8.8
Base Score 8.8 Environmental Score 8.8
impact SubScore 5.9 Temporal Score 8.8
Exploitabality Sub Score 2.8
 
Attack Vector Network Attack Complexity Low
Privileges Required None User Interaction Required
Scope Unchanged Confidentiality Impact High
Integrity Impact High Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 9.3 Attack Range Network
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Several vulnerabilities have been discovered in the chromium web browser.

CVE-2019-20503

Natalie Silvanovich discovered an out-of-bounds read issue in the usrsctp library.

CVE-2020-6422

David Manouchehri discovered a use-after-free issue in the WebGL implementation.

CVE-2020-6424

Sergei Glazunov discovered a use-after-free issue.

CVE-2020-6425

Sergei Glazunov discovered a policy enforcement error related to extensions.

CVE-2020-6426

Avihay Cohen discovered an implementation error in the v8 javascript library.

CVE-2020-6427

Man Yue Mo discovered a use-after-free issue in the audio implementation.

CVE-2020-6428

Man Yue Mo discovered a use-after-free issue in the audio implementation.

CVE-2020-6429

Man Yue Mo discovered a use-after-free issue in the audio implementation.

CVE-2020-6449

Man Yue Mo discovered a use-after-free issue in the audio implementation.

For the oldstable distribution (stretch), security support for chromium has been discontinued.

For the stable distribution (buster), these problems have been fixed in version 80.0.3987.149-1~deb10u1.

We recommend that you upgrade your chromium packages.

For the detailed security status of chromium please refer to its security tracker page at: https://security-tracker.debian.org/tracker/chromium

Original Source

Url : http://www.debian.org/security/2020/dsa-4645

CWE : Common Weakness Enumeration

% Id Name
67 % CWE-416 Use After Free
11 % CWE-125 Out-of-bounds Read
11 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
11 % CWE-20 Improper Input Validation

CPE : Common Platform Enumeration

TypeDescriptionCount
Application