Описание
Use after free in WebRTC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Пакеты
| Пакет | Статус | Версия исправления | Релиз | Тип |
|---|---|---|---|---|
| chromium | fixed | 87.0.4280.88-0.1 | package | |
| chromium | end-of-life | stretch | package | |
| firefox | fixed | 82.0-1 | package | |
| firefox-esr | fixed | 78.4.0esr-1 | package | |
| thunderbird | fixed | 1:78.4.0-1 | package |
Примечания
https://www.mozilla.org/en-US/security/advisories/mfsa2020-45/#CVE-2020-15969
https://www.mozilla.org/en-US/security/advisories/mfsa2020-46/#CVE-2020-15969
https://www.mozilla.org/en-US/security/advisories/mfsa2020-47/#CVE-2020-15969
EPSS
Связанные уязвимости
Use after free in WebRTC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Use after free in WebRTC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Use after free in WebRTC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Use after free in WebRTC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Уязвимость реализации технологии WebRTC программных средств Google Chrome, Firefox, Firefox-ESR и Thunderbird, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
EPSS