First published: Mon Apr 13 2020(Updated: )
Insufficient policy enforcement in extensions in Google Chrome prior to 81.0.4044.92 allowed a remote attacker who had compromised the renderer process to bypass navigation restrictions via a crafted HTML page.
Credit: chrome-cve-admin@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Chrome | <81.0.4044.92 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Fedoraproject Fedora | =30 | |
Fedoraproject Fedora | =31 | |
Fedoraproject Fedora | =32 | |
Opensuse Backports | =sle-15-sp1 | |
openSUSE Leap | =15.1 | |
debian/chromium | 90.0.4430.212-1~deb10u1 116.0.5845.180-1~deb11u1 120.0.6099.129-1~deb11u1 119.0.6045.199-1~deb12u1 120.0.6099.129-1~deb12u1 120.0.6099.129-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this vulnerability is CVE-2020-6435.
The affected software for this vulnerability includes Google Chrome prior to version 81.0.4044.92, Debian Linux 9.0 and 10.0, Fedora 30, 31, and 32, openSUSE Leap 15.1, and chromium on Debian.
The severity rating of CVE-2020-6435 is medium (4.3).
An attacker who has compromised the renderer process can exploit this vulnerability by bypassing navigation restrictions via a crafted HTML page.
To fix this vulnerability, update Google Chrome to version 81.0.4044.92, Debian Linux to the recommended remedy versions, Fedora to the recommended remedy versions, openSUSE Leap to the recommended remedy version, or update chromium on Debian to the recommended remedy versions.