ID

VAR-202010-1236


CVE

CVE-2020-9915


TITLE

plural Apple Access vulnerabilities in products

Trust: 0.8

sources: JVNDB: JVNDB-2020-009856

DESCRIPTION

An access issue existed in Content Security Policy. This issue was addressed with improved access restrictions. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Processing maliciously crafted web content may prevent Content Security Policy from being enforced. Apple Safari, etc. are all products of Apple (Apple). Apple Safari is a web browser that is the default browser included with the Mac OS X and iOS operating systems. Apple iOS is an operating system developed for mobile devices. Apple tvOS is a smart TV operating system. WebKit is one of the web browser engine components. A security vulnerability exists in the WebKit component of several Apple products. The following products and versions are affected: Apple Safari prior to 13.1.2; iOS prior to 13.6; iPadOS prior to 13.6; tvOS prior to 13.4.8; watchOS prior to 6.2.8; Windows-based iTunes prior to 12.10.8. For the stable distribution (buster), these problems have been fixed in version 2.28.4-1~deb10u1. We recommend that you upgrade your webkit2gtk packages. Solution: Download the release images via: quay.io/redhat/quay:v3.3.3 quay.io/redhat/clair-jwt:v3.3.3 quay.io/redhat/quay-builder:v3.3.3 quay.io/redhat/clair:v3.3.3 4. Bugs fixed (https://bugzilla.redhat.com/): 1905758 - CVE-2020-27831 quay: email notifications authorization bypass 1905784 - CVE-2020-27832 quay: persistent XSS in repository notification display 5. JIRA issues fixed (https://issues.jboss.org/): PROJQUAY-1124 - NVD feed is broken for latest Clair v2 version 6. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: OpenShift Container Platform 4.6 compliance-operator security and bug fix update Advisory ID: RHSA-2021:0436-01 Product: Red Hat OpenShift Enterprise Advisory URL: https://access.redhat.com/errata/RHSA-2021:0436 Issue date: 2021-02-16 CVE Names: CVE-2018-20843 CVE-2019-1551 CVE-2019-5018 CVE-2019-8625 CVE-2019-8710 CVE-2019-8720 CVE-2019-8743 CVE-2019-8764 CVE-2019-8766 CVE-2019-8769 CVE-2019-8771 CVE-2019-8782 CVE-2019-8783 CVE-2019-8808 CVE-2019-8811 CVE-2019-8812 CVE-2019-8813 CVE-2019-8814 CVE-2019-8815 CVE-2019-8816 CVE-2019-8819 CVE-2019-8820 CVE-2019-8823 CVE-2019-8835 CVE-2019-8844 CVE-2019-8846 CVE-2019-11068 CVE-2019-13050 CVE-2019-13627 CVE-2019-14889 CVE-2019-15165 CVE-2019-15903 CVE-2019-16168 CVE-2019-16935 CVE-2019-18197 CVE-2019-19221 CVE-2019-19906 CVE-2019-19956 CVE-2019-20218 CVE-2019-20386 CVE-2019-20387 CVE-2019-20388 CVE-2019-20454 CVE-2019-20807 CVE-2019-20907 CVE-2019-20916 CVE-2020-1730 CVE-2020-1751 CVE-2020-1752 CVE-2020-1971 CVE-2020-3862 CVE-2020-3864 CVE-2020-3865 CVE-2020-3867 CVE-2020-3868 CVE-2020-3885 CVE-2020-3894 CVE-2020-3895 CVE-2020-3897 CVE-2020-3899 CVE-2020-3900 CVE-2020-3901 CVE-2020-3902 CVE-2020-6405 CVE-2020-7595 CVE-2020-8177 CVE-2020-8492 CVE-2020-9327 CVE-2020-9802 CVE-2020-9803 CVE-2020-9805 CVE-2020-9806 CVE-2020-9807 CVE-2020-9843 CVE-2020-9850 CVE-2020-9862 CVE-2020-9893 CVE-2020-9894 CVE-2020-9895 CVE-2020-9915 CVE-2020-9925 CVE-2020-10018 CVE-2020-10029 CVE-2020-11793 CVE-2020-13630 CVE-2020-13631 CVE-2020-13632 CVE-2020-14382 CVE-2020-14391 CVE-2020-14422 CVE-2020-15503 CVE-2020-24659 CVE-2020-28362 ==================================================================== 1. Summary: An update for compliance-content-container, ose-compliance-openscap-container, ose-compliance-operator-container, and ose-compliance-operator-metadata-container is now available for Red Hat OpenShift Container Platform 4.6. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. The compliance-operator image updates are now available for OpenShift Container Platform 4.6. This advisory provides the following updates among others: * Enhances profile parsing time. * Fixes excessive resource consumption from the Operator. * Fixes default content image. * Fixes outdated remediation handling. Security Fix(es): * golang: math/big: panic during recursive division of very large numbers (CVE-2020-28362) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 3. Solution: For OpenShift Container Platform 4.6 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update: https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-rel ease-notes.html Details on how to access this content are available at https://docs.openshift.com/container-platform/4.6/updating/updating-cluster - -cli.html. 4. Bugs fixed (https://bugzilla.redhat.com/): 1897635 - CVE-2020-28362 golang: math/big: panic during recursive division of very large numbers 1918990 - ComplianceSuite scans use quay content image for initContainer 1919135 - [OCP v46] The autoApplyRemediation pauses the machineConfigPool if there is outdated complianceRemediation object present 1919846 - After remediation applied, the compliancecheckresults still reports Failed status for some rules 1920999 - Compliance operator is not displayed when disconnected mode is selected in the OpenShift Web-Console. 5. References: https://access.redhat.com/security/cve/CVE-2018-20843 https://access.redhat.com/security/cve/CVE-2019-1551 https://access.redhat.com/security/cve/CVE-2019-5018 https://access.redhat.com/security/cve/CVE-2019-8625 https://access.redhat.com/security/cve/CVE-2019-8710 https://access.redhat.com/security/cve/CVE-2019-8720 https://access.redhat.com/security/cve/CVE-2019-8743 https://access.redhat.com/security/cve/CVE-2019-8764 https://access.redhat.com/security/cve/CVE-2019-8766 https://access.redhat.com/security/cve/CVE-2019-8769 https://access.redhat.com/security/cve/CVE-2019-8771 https://access.redhat.com/security/cve/CVE-2019-8782 https://access.redhat.com/security/cve/CVE-2019-8783 https://access.redhat.com/security/cve/CVE-2019-8808 https://access.redhat.com/security/cve/CVE-2019-8811 https://access.redhat.com/security/cve/CVE-2019-8812 https://access.redhat.com/security/cve/CVE-2019-8813 https://access.redhat.com/security/cve/CVE-2019-8814 https://access.redhat.com/security/cve/CVE-2019-8815 https://access.redhat.com/security/cve/CVE-2019-8816 https://access.redhat.com/security/cve/CVE-2019-8819 https://access.redhat.com/security/cve/CVE-2019-8820 https://access.redhat.com/security/cve/CVE-2019-8823 https://access.redhat.com/security/cve/CVE-2019-8835 https://access.redhat.com/security/cve/CVE-2019-8844 https://access.redhat.com/security/cve/CVE-2019-8846 https://access.redhat.com/security/cve/CVE-2019-11068 https://access.redhat.com/security/cve/CVE-2019-13050 https://access.redhat.com/security/cve/CVE-2019-13627 https://access.redhat.com/security/cve/CVE-2019-14889 https://access.redhat.com/security/cve/CVE-2019-15165 https://access.redhat.com/security/cve/CVE-2019-15903 https://access.redhat.com/security/cve/CVE-2019-16168 https://access.redhat.com/security/cve/CVE-2019-16935 https://access.redhat.com/security/cve/CVE-2019-18197 https://access.redhat.com/security/cve/CVE-2019-19221 https://access.redhat.com/security/cve/CVE-2019-19906 https://access.redhat.com/security/cve/CVE-2019-19956 https://access.redhat.com/security/cve/CVE-2019-20218 https://access.redhat.com/security/cve/CVE-2019-20386 https://access.redhat.com/security/cve/CVE-2019-20387 https://access.redhat.com/security/cve/CVE-2019-20388 https://access.redhat.com/security/cve/CVE-2019-20454 https://access.redhat.com/security/cve/CVE-2019-20807 https://access.redhat.com/security/cve/CVE-2019-20907 https://access.redhat.com/security/cve/CVE-2019-20916 https://access.redhat.com/security/cve/CVE-2020-1730 https://access.redhat.com/security/cve/CVE-2020-1751 https://access.redhat.com/security/cve/CVE-2020-1752 https://access.redhat.com/security/cve/CVE-2020-1971 https://access.redhat.com/security/cve/CVE-2020-3862 https://access.redhat.com/security/cve/CVE-2020-3864 https://access.redhat.com/security/cve/CVE-2020-3865 https://access.redhat.com/security/cve/CVE-2020-3867 https://access.redhat.com/security/cve/CVE-2020-3868 https://access.redhat.com/security/cve/CVE-2020-3885 https://access.redhat.com/security/cve/CVE-2020-3894 https://access.redhat.com/security/cve/CVE-2020-3895 https://access.redhat.com/security/cve/CVE-2020-3897 https://access.redhat.com/security/cve/CVE-2020-3899 https://access.redhat.com/security/cve/CVE-2020-3900 https://access.redhat.com/security/cve/CVE-2020-3901 https://access.redhat.com/security/cve/CVE-2020-3902 https://access.redhat.com/security/cve/CVE-2020-6405 https://access.redhat.com/security/cve/CVE-2020-7595 https://access.redhat.com/security/cve/CVE-2020-8177 https://access.redhat.com/security/cve/CVE-2020-8492 https://access.redhat.com/security/cve/CVE-2020-9327 https://access.redhat.com/security/cve/CVE-2020-9802 https://access.redhat.com/security/cve/CVE-2020-9803 https://access.redhat.com/security/cve/CVE-2020-9805 https://access.redhat.com/security/cve/CVE-2020-9806 https://access.redhat.com/security/cve/CVE-2020-9807 https://access.redhat.com/security/cve/CVE-2020-9843 https://access.redhat.com/security/cve/CVE-2020-9850 https://access.redhat.com/security/cve/CVE-2020-9862 https://access.redhat.com/security/cve/CVE-2020-9893 https://access.redhat.com/security/cve/CVE-2020-9894 https://access.redhat.com/security/cve/CVE-2020-9895 https://access.redhat.com/security/cve/CVE-2020-9915 https://access.redhat.com/security/cve/CVE-2020-9925 https://access.redhat.com/security/cve/CVE-2020-10018 https://access.redhat.com/security/cve/CVE-2020-10029 https://access.redhat.com/security/cve/CVE-2020-11793 https://access.redhat.com/security/cve/CVE-2020-13630 https://access.redhat.com/security/cve/CVE-2020-13631 https://access.redhat.com/security/cve/CVE-2020-13632 https://access.redhat.com/security/cve/CVE-2020-14382 https://access.redhat.com/security/cve/CVE-2020-14391 https://access.redhat.com/security/cve/CVE-2020-14422 https://access.redhat.com/security/cve/CVE-2020-15503 https://access.redhat.com/security/cve/CVE-2020-24659 https://access.redhat.com/security/cve/CVE-2020-28362 https://access.redhat.com/security/updates/classification/#moderate 6. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2021 Red Hat, Inc. CVE-2020-9862: Ophir Lojkine (@lovasoa) Installation note: Safari 13.1.2 may be obtained from the Mac App Store. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-2020-07-15-1 iOS 13.6 and iPadOS 13.6 iOS 13.6 and iPadOS 13.6 are now available and address the following: Audio Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch 7th generation Impact: Processing a maliciously crafted audio file may lead to arbitrary code execution Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2020-9888: JunDong Xie and XingWei Li of Ant-financial Light-Year Security Lab CVE-2020-9890: JunDong Xie and XingWei Li of Ant-financial Light-Year Security Lab CVE-2020-9891: JunDong Xie and XingWei Li of Ant-financial Light-Year Security Lab Audio Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch 7th generation Impact: Processing a maliciously crafted audio file may lead to arbitrary code execution Description: An out-of-bounds write issue was addressed with improved bounds checking. CVE-2020-9889: JunDong Xie and XingWei Li of Ant-financial Light-Year Security Lab AVEVideoEncoder Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch 7th generation Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed by removing the vulnerable code. CVE-2020-9907: an anonymous researcher Bluetooth Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch 7th generation Impact: A remote attacker may cause an unexpected application termination Description: A denial of service issue was addressed with improved input validation. CVE-2020-9931: Dennis Heinze (@ttdennis) of TU Darmstadt, Secure Mobile Networking Lab CoreFoundation Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch 7th generation Impact: A local user may be able to view sensitive user information Description: An issue existed in the handling of environment variables. CVE-2020-9934: an anonymous researcher Crash Reporter Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch 7th generation Impact: A malicious application may be able to break out of its sandbox Description: A memory corruption issue was addressed by removing the vulnerable code. CVE-2020-9865: Zhuo Liang of Qihoo 360 Vulcan Team working with 360 BugCloud GeoServices Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch 7th generation Impact: A malicious application may be able to read sensitive location information Description: An authorization issue was addressed with improved state management. CVE-2020-9933: Min (Spark) Zheng and Xiaolong Bai of Alibaba Inc. iAP Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch 7th generation Impact: An attacker in a privileged network position may be able to execute arbitrary code Description: An input validation issue existed in Bluetooth. CVE-2020-9914: Andy Davis of NCC Group ImageIO Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch 7th generation Impact: Processing a maliciously crafted image may lead to arbitrary code execution Description: An out-of-bounds write issue was addressed with improved bounds checking. CVE-2020-9936: Mickey Jin of Trend Micro Kernel Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch 7th generation Impact: A malicious application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2020-9923: Proteas Kernel Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch 7th generation Impact: An attacker in a privileged network position may be able to inject into active connections within a VPN tunnel Description: A routing issue was addressed with improved restrictions. CVE-2019-14899: William J. Tolley, Beau Kujath, and Jedidiah R. Crandall Kernel Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch 7th generation Impact: An attacker that has already achieved kernel code execution may be able to bypass kernel memory mitigations Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2020-9909: Brandon Azad of Google Project Zero Mail Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch 7th generation Impact: A remote attacker can cause a limited out-of-bounds write, resulting in a denial of service Description: An input validation issue was addressed. CVE-2019-19906 Messages Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch 7th generation Impact: A user that is removed from an iMessage group could rejoin the group Description: An issue existed in the handling of iMessage tapbacks. The issue was resolved with additional verification. CVE-2020-9885: an anonymous researcher, Suryansh Mansharamani, of WWP High School North (medium.com/@suryanshmansha) Model I/O Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch 7th generation Impact: Processing a maliciously crafted USD file may lead to unexpected application termination or arbitrary code execution Description: A buffer overflow issue was addressed with improved memory handling. CVE-2020-9878: Holger Fuhrmannek of Deutsche Telekom Security Safari Login AutoFill Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch 7th generation Impact: A malicious attacker may cause Safari to suggest a password for the wrong domain Description: A logic issue was addressed with improved restrictions. CVE-2020-9903: Nikhil Mittal (@c0d3G33k) of Payatu Labs (payatu.com) Safari Reader Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch 7th generation Impact: An issue in Safari Reader mode may allow a remote attacker to bypass the Same Origin Policy Description: A logic issue was addressed with improved restrictions. CVE-2020-9911: Nikhil Mittal (@c0d3G33k) of Payatu Labs (payatu.com) WebKit Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch 7th generation Impact: A remote attacker may be able to cause unexpected application termination or arbitrary code execution Description: An out-of-bounds read was addressed with improved input validation. CVE-2020-9915: an anonymous researcher WebKit Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch 7th generation Impact: A remote attacker may be able to cause unexpected application termination or arbitrary code execution Description: A use after free issue was addressed with improved memory management. CVE-2020-9893: 0011 working with Trend Micro Zero Day Initiative CVE-2020-9895: Wen Xu of SSLab, Georgia Tech WebKit Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch 7th generation Impact: Processing maliciously crafted web content may lead to universal cross site scripting Description: A logic issue was addressed with improved state management. CVE-2020-9925: an anonymous researcher WebKit Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch 7th generation Impact: A malicious attacker with arbitrary read and write capability may be able to bypass Pointer Authentication Description: Multiple issues were addressed with improved logic. CVE-2020-9910: Samuel Groß of Google Project Zero WebKit Page Loading Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch 7th generation Impact: A malicious attacker may be able to conceal the destination of a URL Description: A URL Unicode encoding issue was addressed with improved state management. CVE-2020-9916: Rakesh Mane (@RakeshMane10) WebKit Web Inspector Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch 7th generation Impact: Copying a URL from Web Inspector may lead to command injection Description: A command injection issue existed in Web Inspector. CVE-2020-9862: Ophir Lojkine (@lovasoa) Wi-Fi Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch 7th generation Impact: A remote attacker may be able to cause unexpected system termination or corrupt kernel memory Description: An out-of-bounds read was addressed with improved input validation. CVE-2020-9918: Jianjun Dai of 360 Alpha Lab working with 360 BugCloud (bugcloud.360.cn) WiFi Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch 7th generation Impact: A remote attacker may be able to cause a denial of service Description: This issue was addressed with improved checks. CVE-2020-9917: an anonymous researcher, Pradeep Deokate of Harman Additional recognition Bluetooth We would like to acknowledge Andy Davis of NCC Group for their assistance. Kernel We would like to acknowledge Brandon Azad of Google Project Zero for their assistance. USB Audio We would like to acknowledge Andy Davis of NCC Group for their assistance. Installation note: This update is available through iTunes and Software Update on your iOS device, and will not appear in your computer's Software Update application, or in the Apple Downloads site. Make sure you have an Internet connection and have installed the latest version of iTunes from https://www.apple.com/itunes/ iTunes and Software Update on the device will automatically check Apple's update server on its weekly schedule. When an update is detected, it is downloaded and the option to be installed is presented to the user when the iOS device is docked. We recommend applying the update immediately if possible. Selecting Don't Install will present the option the next time you connect your iOS device. The automatic update process may take up to a week depending on the day that iTunes or the device checks for updates. You may manually obtain the update via the Check for Updates button within iTunes, or the Software Update on your device. To check that the iPhone, iPod touch, or iPad has been updated: * Navigate to Settings * Select General * Select About. The version after applying this update will be "iOS 13.6 and iPadOS 13.6". -----BEGIN PGP SIGNATURE----- iQIyBAEBCAAdFiEEM5FaaFRjww9EJgvRBz4uGe3y0M0FAl8POhUACgkQBz4uGe3y 0M3VAA/3ciev1rSP1w547PW3gsdGviEqUD6d5cNWfVKyIywIwqhXD24bNn471XPe ufoLyxB/SlH9yKcHjuNYmeL+tu+4Gqx+YvaNTrKkBlh0DP7bB7y1vKVDbHjTsSbx ecrPfDI3ZHXXux9+1fYZ47ISnJDakqVEI3bAw7JFtwL4DmQYdyk+xaUVTXTXksoV YwXin1usgQUZp921ygUNzP5kMwwdmbwenMS+U5s270TlSFPLflB61iykZCEOt7n4 sQqpv1A1GQPigTAPZOevl/TyfUAzRxXhOjXoBw6GSHXmfrLdkT72cw+VuIxZ2rpG 5VGkORd8S0PNDPndLYUb3VxKa4GucbuFd/f4YY4xhJuyZj1ANidPmSn1QkviqCjz 47pvdvWIQpRAQZv4yhlCfcZPYYwkHOPLsmSYbUdfKZvMHx+GneJp4T6ofZ5E7pvQ W354Asbg8fSFbx0jbmQpI0jJIgwLy8ydMVf1HsqToM/mSwTRQBjONNGQweHIdfXQ Z1PJ4cmOTutRmGLgDHIikVkq8mIu+1EOWBkLAXoZrn7d9pbosHZG/5OT3rpXpQU2 FykbSj7EkVyEJ978rAaynixaiuNbaw39osKaP4H5LcFhzyM8tF3paiR0gXKhizTB w57KB0YW0QrWBupRIdAd+yH2jt6iNviLfkq7fUAzZ3hb1iikVw== =Tlxk -----END PGP SIGNATURE----- . ========================================================================== Ubuntu Security Notice USN-4444-1 August 03, 2020 webkit2gtk vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS Summary: Several security issues were fixed in WebKitGTK. Software Description: - webkit2gtk: Web content engine library for GTK+ Details: A large number of security issues were discovered in the WebKitGTK Web and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 20.04 LTS: libjavascriptcoregtk-4.0-18 2.28.4-0ubuntu0.20.04.1 libwebkit2gtk-4.0-37 2.28.4-0ubuntu0.20.04.1 Ubuntu 18.04 LTS: libjavascriptcoregtk-4.0-18 2.28.4-0ubuntu0.18.04.1 libwebkit2gtk-4.0-37 2.28.4-0ubuntu0.18.04.1 This update uses a new upstream release, which includes additional bug fixes. After a standard system update you need to restart any applications that use WebKitGTK, such as Epiphany, to make all the necessary changes. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.7/updating/updating-cluster - -between-minor.html#understanding-upgrade-channels_updating-cluster-between - -minor. Bugs fixed (https://bugzilla.redhat.com/): 1823765 - nfd-workers crash under an ipv6 environment 1838802 - mysql8 connector from operatorhub does not work with metering operator 1838845 - Metering operator can't connect to postgres DB from Operator Hub 1841883 - namespace-persistentvolumeclaim-usage query returns unexpected values 1853652 - CVE-2020-14040 golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash 1868294 - NFD operator does not allow customisation of nfd-worker.conf 1882310 - CVE-2020-24750 jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration 1890672 - NFD is missing a build flag to build correctly 1890741 - path to the CA trust bundle ConfigMap is broken in report operator 1897346 - NFD worker pods not scheduler on a 3 node master/worker cluster 1898373 - Metering operator failing upgrade from 4.4 to 4.6 channel 1900125 - FIPS error while generating RSA private key for CA 1906129 - OCP 4.7: Node Feature Discovery (NFD) Operator in CrashLoopBackOff when deployed from OperatorHub 1908492 - OCP 4.7: Node Feature Discovery (NFD) Operator Custom Resource Definition file in olm-catalog is not in sync with the one in manifests dir leading to failed deployment from OperatorHub 1913837 - The CI and ART 4.7 metering images are not mirrored 1914869 - OCP 4.7 NFD - Operand configuration options for NodeFeatureDiscovery are empty, no supported image for ppc64le 1916010 - olm skip range is set to the wrong range 1921650 - CVE-2021-3121 gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation 1923998 - NFD Operator is failing to update and remains in Replacing state 5

Trust: 2.52

sources: NVD: CVE-2020-9915 // JVNDB: JVNDB-2020-009856 // VULHUB: VHN-188040 // VULMON: CVE-2020-9915 // PACKETSTORM: 168885 // PACKETSTORM: 160889 // PACKETSTORM: 161429 // PACKETSTORM: 158466 // PACKETSTORM: 158456 // PACKETSTORM: 158458 // PACKETSTORM: 158709 // PACKETSTORM: 161536

AFFECTED PRODUCTS

vendor:applemodel:itunesscope:ltversion:12.10.8

Trust: 1.0

vendor:applemodel:icloudscope:ltversion:7.20

Trust: 1.0

vendor:applemodel:tvosscope:ltversion:13.4.8

Trust: 1.0

vendor:applemodel:icloudscope:gteversion:11.0

Trust: 1.0

vendor:applemodel:watchosscope:ltversion:6.2.8

Trust: 1.0

vendor:applemodel:icloudscope:ltversion:11.3

Trust: 1.0

vendor:applemodel:iphone osscope:ltversion:13.6

Trust: 1.0

vendor:applemodel:safariscope:ltversion:13.1.2

Trust: 1.0

vendor:applemodel:ipadosscope:ltversion:13.6

Trust: 1.0

vendor:applemodel:safariscope:eqversion:13.1.2 未満 (macos high sierra)

Trust: 0.8

vendor:applemodel:icloudscope:eqversion:7.20 未満 (windows 7 以降)

Trust: 0.8

vendor:applemodel:iosscope:eqversion:13.6 未満 (iphone 6s 以降)

Trust: 0.8

vendor:applemodel:ipadosscope:eqversion:13.6 未満 (ipad mini 4 以降)

Trust: 0.8

vendor:applemodel:safariscope:eqversion:13.1.2 未満 (macos mojave)

Trust: 0.8

vendor:applemodel:icloudscope:eqversion:11.3 未満 (microsoft store から入手した windows 10 以降)

Trust: 0.8

vendor:applemodel:watchosscope:eqversion:6.2.8 未満 (apple watch series 1 以降)

Trust: 0.8

vendor:applemodel:iosscope:eqversion:13.6 未満 (ipod touch 第 7 世代)

Trust: 0.8

vendor:applemodel:tvosscope:eqversion:13.4.8 未満 (apple tv hd)

Trust: 0.8

vendor:applemodel:ipadosscope:eqversion:13.6 未満 (ipad air 2 以降)

Trust: 0.8

vendor:applemodel:tvosscope:eqversion:13.4.8 未満 (apple tv 4k)

Trust: 0.8

vendor:applemodel:itunesscope:eqversion:for windows 12.10.8 未満 (windows 7 以降)

Trust: 0.8

vendor:applemodel:safariscope:eqversion:13.1.2 未満 (macos catalina)

Trust: 0.8

sources: JVNDB: JVNDB-2020-009856 // NVD: CVE-2020-9915

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-9915
value: MEDIUM

Trust: 1.0

NVD: JVNDB-2020-009856
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202007-1158
value: MEDIUM

Trust: 0.6

VULHUB: VHN-188040
value: MEDIUM

Trust: 0.1

VULMON: CVE-2020-9915
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2020-9915
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

NVD: JVNDB-2020-009856
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-188040
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-9915
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: JVNDB-2020-009856
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-188040 // VULMON: CVE-2020-9915 // CNNVD: CNNVD-202007-1158 // JVNDB: JVNDB-2020-009856 // NVD: CVE-2020-9915

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

sources: NVD: CVE-2020-9915

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 158709 // CNNVD: CNNVD-202007-1158

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202007-1158

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-009856

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-188040

PATCH

title:HT211292url:https://support.apple.com/en-us/HT211292

Trust: 0.8

title:HT211293url:https://support.apple.com/en-us/HT211293

Trust: 0.8

title:HT211294url:https://support.apple.com/en-us/HT211294

Trust: 0.8

title:HT211295url:https://support.apple.com/en-us/HT211295

Trust: 0.8

title:HT211288url:https://support.apple.com/en-us/HT211288

Trust: 0.8

title:HT211290url:https://support.apple.com/en-us/HT211290

Trust: 0.8

title:HT211291url:https://support.apple.com/en-us/HT211291

Trust: 0.8

title:HT211293url:https://support.apple.com/ja-jp/HT211293

Trust: 0.8

title:HT211294url:https://support.apple.com/ja-jp/HT211294

Trust: 0.8

title:HT211295url:https://support.apple.com/ja-jp/HT211295

Trust: 0.8

title:HT211288url:https://support.apple.com/ja-jp/HT211288

Trust: 0.8

title:HT211290url:https://support.apple.com/ja-jp/HT211290

Trust: 0.8

title:HT211291url:https://support.apple.com/ja-jp/HT211291

Trust: 0.8

title:HT211292url:https://support.apple.com/ja-jp/HT211292

Trust: 0.8

title:Multiple Apple product WebKit Fixes for component security vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=124606

Trust: 0.6

title:Debian Security Advisories: DSA-4739-1 webkit2gtk -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=1f5a43d66ba1bd3cae01970bb774e5f6

Trust: 0.1

title:Apple: iCloud for Windows 7.20url:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=50e6b35a047c9702f4cdebdf81483b05

Trust: 0.1

title:Apple: iCloud for Windows 11.3url:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=947a08401ec7e5f309d5ae26f5006f48

Trust: 0.1

title:Apple: iOS 13.6 and iPadOS 13.6url:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=a82d39d4c9a42fcf07757428b2f562b3

Trust: 0.1

sources: VULMON: CVE-2020-9915 // CNNVD: CNNVD-202007-1158 // JVNDB: JVNDB-2020-009856

EXTERNAL IDS

db:NVDid:CVE-2020-9915

Trust: 3.4

db:PACKETSTORMid:158709

Trust: 0.8

db:JVNid:JVNVU95491800

Trust: 0.8

db:JVNid:JVNVU94090210

Trust: 0.8

db:JVNDBid:JVNDB-2020-009856

Trust: 0.8

db:PACKETSTORMid:158688

Trust: 0.7

db:CNNVDid:CNNVD-202007-1158

Trust: 0.7

db:PACKETSTORMid:158466

Trust: 0.7

db:AUSCERTid:ESB-2020.3893

Trust: 0.6

db:AUSCERTid:ESB-2020.2434

Trust: 0.6

db:AUSCERTid:ESB-2021.0234

Trust: 0.6

db:AUSCERTid:ESB-2022.1025

Trust: 0.6

db:AUSCERTid:ESB-2020.2659

Trust: 0.6

db:AUSCERTid:ESB-2020.2812

Trust: 0.6

db:AUSCERTid:ESB-2020.4513

Trust: 0.6

db:AUSCERTid:ESB-2020.2785

Trust: 0.6

db:AUSCERTid:ESB-2021.0691

Trust: 0.6

db:AUSCERTid:ESB-2021.0099

Trust: 0.6

db:AUSCERTid:ESB-2021.0864

Trust: 0.6

db:AUSCERTid:ESB-2021.0584

Trust: 0.6

db:NSFOCUSid:50228

Trust: 0.6

db:CNVDid:CNVD-2020-49308

Trust: 0.1

db:VULHUBid:VHN-188040

Trust: 0.1

db:VULMONid:CVE-2020-9915

Trust: 0.1

db:PACKETSTORMid:168885

Trust: 0.1

db:PACKETSTORMid:160889

Trust: 0.1

db:PACKETSTORMid:161429

Trust: 0.1

db:PACKETSTORMid:158456

Trust: 0.1

db:PACKETSTORMid:158458

Trust: 0.1

db:PACKETSTORMid:161536

Trust: 0.1

sources: VULHUB: VHN-188040 // VULMON: CVE-2020-9915 // PACKETSTORM: 168885 // PACKETSTORM: 160889 // PACKETSTORM: 161429 // PACKETSTORM: 158466 // PACKETSTORM: 158456 // PACKETSTORM: 158458 // PACKETSTORM: 158709 // PACKETSTORM: 161536 // CNNVD: CNNVD-202007-1158 // JVNDB: JVNDB-2020-009856 // NVD: CVE-2020-9915

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2020-9915

Trust: 1.9

url:https://support.apple.com/ht211288

Trust: 1.8

url:https://support.apple.com/ht211290

Trust: 1.8

url:https://support.apple.com/ht211291

Trust: 1.8

url:https://support.apple.com/ht211292

Trust: 1.8

url:https://support.apple.com/ht211293

Trust: 1.8

url:https://support.apple.com/ht211294

Trust: 1.8

url:https://support.apple.com/ht211295

Trust: 1.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-9915

Trust: 0.8

url:http://jvn.jp/vu/jvnvu94090210/index.html

Trust: 0.8

url:http://jvn.jp/vu/jvnvu95491800/index.html

Trust: 0.8

url:https://www.suse.com/support/update/announcement/2020/suse-su-20202232-1

Trust: 0.6

url:http://www.nsfocus.net/vulndb/50228

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.1025

Trust: 0.6

url:https://packetstormsecurity.com/files/158709/ubuntu-security-notice-usn-4444-1.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0864

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2785/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0691

Trust: 0.6

url:https://support.apple.com/en-us/ht211291

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2434/

Trust: 0.6

url:https://vigilance.fr/vulnerability/webkitgtk-multiple-vulnerabilities-32994

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2659/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2812/

Trust: 0.6

url:https://vigilance.fr/vulnerability/apple-ios-multiple-vulnerabilities-32847

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.4513/

Trust: 0.6

url:https://support.apple.com/en-us/ht211295

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0099/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0234/

Trust: 0.6

url:https://support.apple.com/kb/ht211294

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0584

Trust: 0.6

url:https://support.apple.com/kb/ht211293

Trust: 0.6

url:https://support.apple.com/kb/ht211292

Trust: 0.6

url:https://packetstormsecurity.com/files/158466/apple-security-advisory-2020-07-15-5.html

Trust: 0.6

url:https://packetstormsecurity.com/files/158688/gentoo-linux-security-advisory-202007-61.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.3893/

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2020-9862

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2020-9894

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2020-9893

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2020-9895

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2020-9925

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2019-19906

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2019-20907

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-13050

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-9925

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-9802

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-20218

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-9895

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-8625

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-20388

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-15165

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-14382

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-8812

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-3899

Trust: 0.3

url:https://bugzilla.redhat.com/):

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-8819

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-3867

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-1971

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-20454

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-8720

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-9893

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-19221

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-8808

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-3902

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-20907

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-1751

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-3900

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-8743

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-9805

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-8820

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-9807

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-8769

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-8710

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-8813

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-9850

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-7595

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-8710

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-8811

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-5018

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-16168

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-9803

Trust: 0.3

url:https://access.redhat.com/security/team/contact/

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-9862

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-24659

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-19956

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-9327

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-3885

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-15503

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-20807

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-16935

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-20916

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-5018

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-19956

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-10018

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-14422

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-14889

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-8835

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-8764

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-8844

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-3865

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-1730

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-3864

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-19906

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-20387

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-20387

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-13627

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-14391

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-3862

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-3901

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-20916

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-8823

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-1752

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-19221

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-15903

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-3895

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-15165

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-16935

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-8492

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-11793

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-20454

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2018-20843

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-8720

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-9894

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-8816

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-9843

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-13627

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-6405

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-8771

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-13050

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-3897

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-9806

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-8814

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-14889

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2018-20843

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-8743

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-20388

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-9915

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-16168

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-8815

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-13632

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-20218

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-8625

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-10029

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-8783

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-20807

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-13630

Trust: 0.3

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-15903

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-13631

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-8766

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-3868

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-8846

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-3894

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-8782

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2020-9916

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2020-9910

Trust: 0.3

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-9911

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-9903

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-9918

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-9889

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-9909

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-9933

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-9914

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-9888

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-14899

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-9891

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-9907

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-9890

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-9865

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/185384

Trust: 0.1

url:https://www.debian.org/security/faq

Trust: 0.1

url:https://security-tracker.debian.org/tracker/webkit2gtk

Trust: 0.1

url:https://www.debian.org/security/

Trust: 0.1

url:https://issues.jboss.org/):

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:0050

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8771

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-27831

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8769

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-27832

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8764

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8766

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-11068

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-18197

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-18197

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-8177

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-1551

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-1551

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-20386

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.6/updating/updating-cluster

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-28362

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-rel

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-20386

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:0436

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-11068

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-9912

Trust: 0.1

url:https://www.apple.com/itunes/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-9878

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-9931

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-9917

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-9923

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-9885

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-9934

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-9936

Trust: 0.1

url:https://usn.ubuntu.com/4444-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/webkit2gtk/2.28.4-0ubuntu0.20.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/webkit2gtk/2.28.4-0ubuntu0.18.04.1

Trust: 0.1

url:https://access.redhat.com/errata/rhea-2020:5633

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-8624

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.7/updating/updating-cluster

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-17450

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-13225

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-8623

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-8566

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-25211

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel

Trust: 0.1

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:5635

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-17450

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15157

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-25658

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15999

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-17546

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-3884

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-3884

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-8622

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-13225

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3121

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-17546

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-14040

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-24750

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-8619

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3898

Trust: 0.1

sources: VULHUB: VHN-188040 // VULMON: CVE-2020-9915 // PACKETSTORM: 168885 // PACKETSTORM: 160889 // PACKETSTORM: 161429 // PACKETSTORM: 158466 // PACKETSTORM: 158456 // PACKETSTORM: 158458 // PACKETSTORM: 158709 // PACKETSTORM: 161536 // CNNVD: CNNVD-202007-1158 // JVNDB: JVNDB-2020-009856 // NVD: CVE-2020-9915

CREDITS

Ubuntu

Trust: 0.7

sources: PACKETSTORM: 158709 // CNNVD: CNNVD-202007-1158

SOURCES

db:VULHUBid:VHN-188040
db:VULMONid:CVE-2020-9915
db:PACKETSTORMid:168885
db:PACKETSTORMid:160889
db:PACKETSTORMid:161429
db:PACKETSTORMid:158466
db:PACKETSTORMid:158456
db:PACKETSTORMid:158458
db:PACKETSTORMid:158709
db:PACKETSTORMid:161536
db:CNNVDid:CNNVD-202007-1158
db:JVNDBid:JVNDB-2020-009856
db:NVDid:CVE-2020-9915

LAST UPDATE DATE

2026-02-07T22:39:36.628000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-188040date:2023-01-09T00:00:00
db:VULMONid:CVE-2020-9915date:2020-10-20T00:00:00
db:CNNVDid:CNNVD-202007-1158date:2023-01-10T00:00:00
db:JVNDBid:JVNDB-2020-009856date:2020-12-10T08:05:00
db:NVDid:CVE-2020-9915date:2024-11-21T05:41:31.183

SOURCES RELEASE DATE

db:VULHUBid:VHN-188040date:2020-10-16T00:00:00
db:VULMONid:CVE-2020-9915date:2020-10-16T00:00:00
db:PACKETSTORMid:168885date:2020-08-03T12:12:00
db:PACKETSTORMid:160889date:2021-01-11T16:29:48
db:PACKETSTORMid:161429date:2021-02-16T15:44:48
db:PACKETSTORMid:158466date:2020-07-17T19:35:50
db:PACKETSTORMid:158456date:2020-07-17T19:23:30
db:PACKETSTORMid:158458date:2020-07-17T19:24:07
db:PACKETSTORMid:158709date:2020-08-03T15:37:49
db:PACKETSTORMid:161536date:2021-02-25T15:26:54
db:CNNVDid:CNNVD-202007-1158date:2020-07-15T00:00:00
db:JVNDBid:JVNDB-2020-009856date:2020-12-10T08:05:00
db:NVDid:CVE-2020-9915date:2020-10-16T17:15:17.057