Insufficient validation of untrusted input in command line handling in Google Chrome on Windows prior to 85.0.4183.83 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_25.html | release notes vendor advisory |
https://crbug.com/937179 | permissions required vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html | mailing list third party advisory patch vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html | mailing list third party advisory vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html | mailing list third party advisory vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EE7XWIZBME7JAY7N6CGPET4CLNHHEIVT/ | vendor advisory |
https://www.debian.org/security/2021/dsa-4824 | third party advisory vendor advisory |