Insufficient policy enforcement in extensions in Google Chrome prior to 81.0.4044.92 allowed an attacker who convinced a user to install a malicious extension to obtain potentially sensitive information from process memory via a crafted Chrome Extension.
The product generates an error message that includes sensitive information about its environment, users, or associated data.
Link | Tags |
---|---|
https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_7.html | release notes vendor advisory |
https://crbug.com/714617 | vendor advisory mailing list exploit |
http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html | vendor advisory mailing list third party advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html | vendor advisory mailing list third party advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XWIVVYIQU67QR2LHNGGZBS4FZOW2RQO/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFVP775RPRDVY5FUCN7ABH5AE74TQFDD/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XMXPDHEEACPD3BCMTC26SCCYB2ZMUOAO/ | vendor advisory |
https://www.debian.org/security/2020/dsa-4714 | third party advisory vendor advisory |