CVE-2020-15969

Use after free in WebRTC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
References
Link Resource
https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html Release Notes Vendor Advisory
https://crbug.com/1124659 Permissions Required Vendor Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GWCWNHTTYOH6HSFUXPGPBB6J6JYZHZE/ Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/24QFL4C3AZKMFVL7LVSYMU2DNE5VVUGS/ Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SC3U3H6AISVZB5PLZLLNF4HMQ4UFFL7M/ Mailing List Third Party Advisory
https://support.apple.com/kb/HT212009 Third Party Advisory
https://support.apple.com/kb/HT212007 Third Party Advisory
https://support.apple.com/kb/HT212005 Third Party Advisory
https://support.apple.com/kb/HT212003 Third Party Advisory
https://support.apple.com/kb/HT212011 Third Party Advisory
http://seclists.org/fulldisclosure/2020/Dec/30 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2020/Dec/29 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2020/Dec/24 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2020/Dec/27 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2020/Dec/26 Mailing List Third Party Advisory
https://www.debian.org/security/2021/dsa-4824 Third Party Advisory
https://security.gentoo.org/glsa/202101-30 Third Party Advisory
Configurations

Configuration 1

cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
cpe:2.3:a:opensuse:backports_sle:15.0:sp2:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*

Information

Published : 2020-11-03 03:15

Updated : 2021-07-21 11:39


NVD link : CVE-2020-15969

Mitre link : CVE-2020-15969

Products Affected
No products.