First published: Mon Apr 13 2020(Updated: )
Insufficient policy enforcement in navigations in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.
Credit: chrome-cve-admin@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Chrome | <81.0.4044.92 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Fedoraproject Fedora | =30 | |
Fedoraproject Fedora | =31 | |
Fedoraproject Fedora | =32 | |
Opensuse Backports | =sle-15-sp1 | |
openSUSE Leap | =15.1 | |
debian/chromium | 90.0.4430.212-1~deb10u1 116.0.5845.180-1~deb11u1 120.0.6099.129-1~deb11u1 119.0.6045.199-1~deb12u1 120.0.6099.129-1~deb12u1 120.0.6099.129-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-6432 is a vulnerability in Google Chrome prior to 81.0.4044.92 that allows a remote attacker to bypass navigation restrictions via a crafted HTML page.
Google Chrome versions prior to 81.0.4044.92, Debian Linux 9.0 and 10.0, Fedora 30, 31, and 32, openSUSE Leap 15.1, and openSUSE Backports sle-15-sp1 are affected by CVE-2020-6432.
CVE-2020-6432 has a severity rating of 4.3 (medium).
To fix CVE-2020-6432, update Google Chrome to version 81.0.4044.92 or later and ensure that your operating system and software are up to date with the latest security patches.
You can find more information about CVE-2020-6432 at the following references: [Debian Security Tracker](https://security-tracker.debian.org/tracker/CVE-2020-6432), [openSUSE Security Announcements](http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html), [openSUSE Security Announcements](http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html).