CVE-2020-15959

Insufficient policy enforcement in networking in Google Chrome prior to 85.0.4183.102 allowed an attacker who convinced the user to enable logging to obtain potentially sensitive information from process memory via social engineering.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html Mailing List Third Party Advisory
https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop.html Release Notes Vendor Advisory
https://crbug.com/1122684 Permissions Required Vendor Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FN7HZIGAOCZKBT4LV363BCPRA5FLY25I/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNIYFJST4TFJYFZ27VODBOINCLBGULTD/
https://security.gentoo.org/glsa/202101-30 Third Party Advisory
https://www.debian.org/security/2021/dsa-4824 Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html Mailing List Third Party Advisory
https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop.html Release Notes Vendor Advisory
https://crbug.com/1122684 Permissions Required Vendor Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FN7HZIGAOCZKBT4LV363BCPRA5FLY25I/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNIYFJST4TFJYFZ27VODBOINCLBGULTD/
https://security.gentoo.org/glsa/202101-30 Third Party Advisory
https://www.debian.org/security/2021/dsa-4824 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*
cpe:2.3:a:opensuse:backports_sle:15.0:sp2:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2020-09-21 20:15

Updated : 2024-11-21 05:06


NVD link : CVE-2020-15959

Mitre link : CVE-2020-15959

CVE.ORG link : CVE-2020-15959


JSON object : View

Products Affected

opensuse

  • backports_sle
  • leap

fedoraproject

  • fedora

debian

  • debian_linux

google

  • chrome