{"affected":[{"ecosystem_specific":{"binaries":[{"chromedriver":"80.0.3987.87-lp151.2.63.1","chromium":"80.0.3987.87-lp151.2.63.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.1","name":"chromium","purl":"pkg:rpm/opensuse/chromium&distro=openSUSE%20Leap%2015.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"80.0.3987.87-lp151.2.63.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for chromium fixes the following issues:\n\nChromium was updated to version 80.0.3987.87 (boo#1162833).\n\nSecurity issues fixed:\n\n- CVE-2020-6381: Integer overflow in JavaScript (boo#1162833).\n- CVE-2020-6382: Type Confusion in JavaScript (boo#1162833).\n- CVE-2019-18197: Multiple vulnerabilities in XML (boo#1162833).\n- CVE-2019-19926: Inappropriate implementation in SQLite (boo#1162833).\n- CVE-2020-6385: Insufficient policy enforcement in storage (boo#1162833).\n- CVE-2019-19880, CVE-2019-19925: Multiple vulnerabilities in SQLite (boo#1162833).\n- CVE-2020-6387: Out of bounds write in WebRTC (boo#1162833).\n- CVE-2020-6388: Out of bounds memory access in WebAudio (boo#1162833).\n- CVE-2020-6389: Out of bounds write in WebRTC (boo#1162833).\n- CVE-2020-6390: Out of bounds memory access in streams (boo#1162833).\n- CVE-2020-6391: Insufficient validation of untrusted input in Blink (boo#1162833).\n- CVE-2020-6392: Insufficient policy enforcement in extensions (boo#1162833).\n- CVE-2020-6393: Insufficient policy enforcement in Blink (boo#1162833).\n- CVE-2020-6394: Insufficient policy enforcement in Blink (boo#1162833).\n- CVE-2020-6395: Out of bounds read in JavaScript (boo#1162833).\n- CVE-2020-6396: Inappropriate implementation in Skia (boo#1162833).\n- CVE-2020-6397: Incorrect security UI in sharing (boo#1162833).\n- CVE-2020-6398: Uninitialized use in PDFium (boo#1162833).\n- CVE-2020-6399: Insufficient policy enforcement in AppCache (boo#1162833).\n- CVE-2020-6400: Inappropriate implementation in CORS (boo#1162833).\n- CVE-2020-6401: Insufficient validation of untrusted input in Omnibox (boo#1162833).\n- CVE-2020-6402: Insufficient policy enforcement in downloads (boo#1162833).\n- CVE-2020-6403: Incorrect security UI in Omnibox (boo#1162833).\n- CVE-2020-6404: Inappropriate implementation in Blink (boo#1162833).\n- CVE-2020-6405: Out of bounds read in SQLite (boo#1162833).\n- CVE-2020-6406: Use after free in audio (boo#1162833).\n- CVE-2019-19923: Out of bounds memory access in SQLite (boo#1162833).\n- CVE-2020-6408: Insufficient policy enforcement in CORS (boo#1162833).\n- CVE-2020-6409: Inappropriate implementation in Omnibox (boo#1162833).\n- CVE-2020-6410: Insufficient policy enforcement in navigation (boo#1162833).\n- CVE-2020-6411: Insufficient validation of untrusted input in Omnibox (boo#1162833).\n- CVE-2020-6412: Insufficient validation of untrusted input in Omnibox (boo#1162833).\n- CVE-2020-6413: Inappropriate implementation in Blink (boo#1162833).\n- CVE-2020-6414: Insufficient policy enforcement in Safe Browsing (boo#1162833).\n- CVE-2020-6415: Inappropriate implementation in JavaScript (boo#1162833).\n- CVE-2020-6416: Insufficient data validation in streams (boo#1162833).\n- CVE-2020-6417: Inappropriate implementation in installer (boo#1162833).\n","id":"openSUSE-SU-2020:0189-1","modified":"2020-02-08T23:11:40Z","published":"2020-02-08T23:11:40Z","references":[{"type":"ADVISORY","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WSVRYLRPQE3DA7JXQF45EVKRHJ433WYL/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1162833"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-18197"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-19880"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-19923"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-19925"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-19926"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-6381"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-6382"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-6385"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-6387"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-6388"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-6389"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-6390"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-6391"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-6392"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-6393"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-6394"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-6395"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-6396"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-6397"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-6398"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-6399"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-6400"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-6401"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-6402"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-6403"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-6404"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-6405"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-6406"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-6408"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-6409"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-6410"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-6411"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-6412"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-6413"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-6414"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-6415"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-6416"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-6417"}],"related":["CVE-2019-18197","CVE-2019-19880","CVE-2019-19923","CVE-2019-19925","CVE-2019-19926","CVE-2020-6381","CVE-2020-6382","CVE-2020-6385","CVE-2020-6387","CVE-2020-6388","CVE-2020-6389","CVE-2020-6390","CVE-2020-6391","CVE-2020-6392","CVE-2020-6393","CVE-2020-6394","CVE-2020-6395","CVE-2020-6396","CVE-2020-6397","CVE-2020-6398","CVE-2020-6399","CVE-2020-6400","CVE-2020-6401","CVE-2020-6402","CVE-2020-6403","CVE-2020-6404","CVE-2020-6405","CVE-2020-6406","CVE-2020-6408","CVE-2020-6409","CVE-2020-6410","CVE-2020-6411","CVE-2020-6412","CVE-2020-6413","CVE-2020-6414","CVE-2020-6415","CVE-2020-6416","CVE-2020-6417"],"summary":"Security update for chromium","upstream":["CVE-2019-18197","CVE-2019-19880","CVE-2019-19923","CVE-2019-19925","CVE-2019-19926","CVE-2020-6381","CVE-2020-6382","CVE-2020-6385","CVE-2020-6387","CVE-2020-6388","CVE-2020-6389","CVE-2020-6390","CVE-2020-6391","CVE-2020-6392","CVE-2020-6393","CVE-2020-6394","CVE-2020-6395","CVE-2020-6396","CVE-2020-6397","CVE-2020-6398","CVE-2020-6399","CVE-2020-6400","CVE-2020-6401","CVE-2020-6402","CVE-2020-6403","CVE-2020-6404","CVE-2020-6405","CVE-2020-6406","CVE-2020-6408","CVE-2020-6409","CVE-2020-6410","CVE-2020-6411","CVE-2020-6412","CVE-2020-6413","CVE-2020-6414","CVE-2020-6415","CVE-2020-6416","CVE-2020-6417"]}