First published: Wed Jun 03 2020(Updated: )
Insufficient policy enforcement in developer tools in Google Chrome prior to 83.0.4103.97 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension.
Credit: chrome-cve-admin@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Chrome | <83.0.4103.97 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Opensuse Backports | =sle-15-sp1 | |
openSUSE Leap | =15.1 | |
debian/chromium | 90.0.4430.212-1~deb10u1 116.0.5845.180-1~deb11u1 120.0.6099.129-1~deb11u1 119.0.6045.199-1~deb12u1 120.0.6099.129-1~deb12u1 120.0.6099.129-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-6495 is medium with a CVSS score of 6.5.
CVE-2020-6495 affects Google Chrome versions prior to 83.0.4103.97.
An attacker can exploit CVE-2020-6495 by convincing a user to install a malicious extension in Google Chrome.
The recommended remedy for CVE-2020-6495 on Debian Debian Linux is to update to version 90.0.4430.212-1~deb10u1 or later.
You can find more information about CVE-2020-6495 at the following references: [1] [2] [3].