Upstream information
Description
Insufficient data validation in URL formatting in Google Chrome prior to 81.0.4044.122 allowed a remote attacker to perform domain spoofing via a crafted domain name.SUSE information
Overall state of this security issue: Does not affect SUSE products
This issue is currently rated as having moderate severity.
National Vulnerability Database | |
---|---|
Base Score | 4.3 |
Vector | AV:N/AC:M/Au:N/C:N/I:P/A:N |
Access Vector | Network |
Access Complexity | Medium |
Authentication | None |
Confidentiality Impact | None |
Integrity Impact | Partial |
Availability Impact | None |
National Vulnerability Database | |
---|---|
Base Score | 6.5 |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N |
Access Vector | Network |
Access Complexity | Low |
Privileges Required | None |
User Interaction | Required |
Scope | Unchanged |
Confidentiality Impact | None |
Integrity Impact | High |
Availability Impact | None |
CVSSv3 Version | 3.1 |
- openSUSE-SU-2020:0604-1, published Sun, 3 May 2020 06:13:53 +0200 (CEST)
- openSUSE-SU-2020:0615-1, published Wed, 6 May 2020 15:18:21 +0200 (CEST)
- openSUSE-SU-2020:0635-1, published Mon, 11 May 2020 11:43:08 +0200 (CEST)
List of released packages
Product(s) | Fixed package version(s) | References |
---|---|---|
SUSE Package Hub for SUSE Linux Enterprise 15 SP1 |
| Patchnames: openSUSE-2020-604 openSUSE-2020-615 |
openSUSE Leap 15.1 |
| Patchnames: openSUSE-2020-604 |
openSUSE Leap 15.1 NonFree |
| Patchnames: openSUSE-2020-635 |