CVE-2020-6424

Name
CVE-2020-6424
Description
Use after free in media in Google Chrome prior to 80.0.3987.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
NVD Severity
high
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Third Party Advisory https://www.debian.org/security/2020/dsa-4645
Permissions Required https://crbug.com/1031142
Mailing List http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00028.html
Vendor Advisory https://chromereleases.googleblog.com/2020/03/stable-channel-update-for-desktop_18.html
Third Party Advisory https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWANFIR3PYAL5RJQ4AO3ZS2DYMSF2ZGZ/
GENTOO https://security.gentoo.org/glsa/202003-53
FEDORA https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DDNOAGIX5D77TTHT6YPMVJ5WTXTCQEI/
FEDORA https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6IOHSO6BUKC6I66J5PZOMAGFVJ66ZS57/
SUSE http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00037.html

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:* chrome >= None < 80.0.3987.149

Vulnerable and fixed packages

Source package Branch Version Maintainer Status