Name | CVE-2020-15959 |
Description | Insufficient policy enforcement in networking in Google Chrome prior to 85.0.4183.102 allowed an attacker who convinced the user to enable logging to obtain potentially sensitive information from process memory via social engineering. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DSA-4824-1 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
chromium (PTS) | stretch (security), stretch (lts), stretch | 73.0.3683.75-1~deb9u1 | vulnerable |
| buster (security), buster, buster (lts) | 90.0.4430.212-1~deb10u1 | fixed |
| bullseye (security), bullseye | 120.0.6099.224-1~deb11u1 | fixed |
| bookworm | 130.0.6723.91-1~deb12u1 | fixed |
| bookworm (security) | 130.0.6723.116-1~deb12u1 | fixed |
| trixie | 130.0.6723.116-1 | fixed |
| sid | 131.0.6778.85-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
chromium | source | stretch | (unfixed) | end-of-life | | |
chromium | source | buster | 87.0.4280.88-0.4~deb10u1 | | DSA-4824-1 | |
chromium | source | (unstable) | 87.0.4280.88-0.1 | | | |
Notes
[stretch] - chromium <end-of-life> (see DSA 4562)