Inappropriate implementation in developer tools in Google Chrome prior to 81.0.4044.92 allowed a remote attacker who had convinced the user to use devtools to potentially exploit heap corruption via a crafted HTML page.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_7.html | release notes vendor advisory |
https://crbug.com/991217 | permissions required exploit vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html | mailing list third party advisory vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html | mailing list third party advisory vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XWIVVYIQU67QR2LHNGGZBS4FZOW2RQO/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFVP775RPRDVY5FUCN7ABH5AE74TQFDD/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XMXPDHEEACPD3BCMTC26SCCYB2ZMUOAO/ | vendor advisory |
https://www.debian.org/security/2020/dsa-4714 | third party advisory vendor advisory |