Use after free in offscreen canvas in Google Chrome prior to 85.0.4183.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 05:35
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html - Mailing List, Patch, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html - Mailing List, Third Party Advisory | |
References | () https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop.html - Release Notes, Vendor Advisory | |
References | () https://crbug.com/1111737 - Permissions Required, Vendor Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FN7HZIGAOCZKBT4LV363BCPRA5FLY25I/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNIYFJST4TFJYFZ27VODBOINCLBGULTD/ - | |
References | () https://security.gentoo.org/glsa/202101-30 - Third Party Advisory | |
References | () https://www.debian.org/security/2021/dsa-4824 - Third Party Advisory |
07 Nov 2023, 03:24
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2020-09-21 20:15
Updated : 2024-11-21 05:35
NVD link : CVE-2020-6576
Mitre link : CVE-2020-6576
CVE.ORG link : CVE-2020-6576
JSON object : View
Products Affected
opensuse
- leap
- backports_sle
debian
- debian_linux
- chrome
fedoraproject
- fedora