Fedora 31 : chromium (2020-f6271d7afa)

high Nessus Plugin ID 134718



The remote Fedora host is missing a security update.


Update to 80.0.3987.132. Lots of security fixes here. VAAPI re-enabled by default except on NVIDIA.

List of CVEs fixed (since last update) :

- CVE-2019-20446

- CVE-2020-6381

- CVE-2020-6382

- CVE-2020-6383

- CVE-2020-6384

- CVE-2020-6385

- CVE-2020-6386

- CVE-2020-6387

- CVE-2020-6388

- CVE-2020-6389

- CVE-2020-6390

- CVE-2020-6391

- CVE-2020-6392

- CVE-2020-6393

- CVE-2020-6394

- CVE-2020-6395

- CVE-2020-6396

- CVE-2020-6397

- CVE-2020-6398

- CVE-2020-6399

- CVE-2020-6400

- CVE-2020-6401

- CVE-2020-6402

- CVE-2020-6403

- CVE-2020-6404

- CVE-2020-6405

- CVE-2020-6406

- CVE-2020-6407

- CVE-2020-6408

- CVE-2020-6409

- CVE-2020-6410

- CVE-2020-6411

- CVE-2020-6412

- CVE-2020-6413

- CVE-2020-6414

- CVE-2020-6415

- CVE-2020-6416

- CVE-2020-6417

- CVE-2020-6418

- CVE-2020-6420

Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website.
Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.


Update the affected chromium package.

See Also


Plugin Details

Severity: High

ID: 134718

File Name: fedora_2020-f6271d7afa.nasl

Version: 1.7

Type: local

Agent: unix

Published: 3/20/2020

Updated: 4/4/2022

Supported Sensors: Frictionless Assessment Agent, Nessus Agent

Risk Information

CVSS Score Source: CVE-2020-6420


Risk Factor: Critical

Score: 9.7


Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.9

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: E:H/RL:OF/RC:C


Risk Factor: High

Base Score: 8.8

Temporal Score: 8.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: E:H/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:fedoraproject:fedora:chromium, cpe:/o:fedoraproject:fedora:31

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 3/20/2020

Vulnerability Publication Date: 2/2/2020

CISA Known Exploited Dates: 5/3/2022

Exploitable With

Metasploit (Google Chrome 80 JSCreate side-effect type confusion exploit)

Reference Information

CVE: CVE-2019-20446, CVE-2020-10531, CVE-2020-6381, CVE-2020-6382, CVE-2020-6383, CVE-2020-6384, CVE-2020-6385, CVE-2020-6386, CVE-2020-6387, CVE-2020-6388, CVE-2020-6389, CVE-2020-6390, CVE-2020-6391, CVE-2020-6392, CVE-2020-6393, CVE-2020-6394, CVE-2020-6395, CVE-2020-6396, CVE-2020-6397, CVE-2020-6398, CVE-2020-6399, CVE-2020-6400, CVE-2020-6401, CVE-2020-6402, CVE-2020-6403, CVE-2020-6404, CVE-2020-6405, CVE-2020-6406, CVE-2020-6407, CVE-2020-6408, CVE-2020-6409, CVE-2020-6410, CVE-2020-6411, CVE-2020-6412, CVE-2020-6413, CVE-2020-6414, CVE-2020-6415, CVE-2020-6416, CVE-2020-6417, CVE-2020-6418, CVE-2020-6420