Unrated severityNVD Advisory· Published May 21, 2020· Updated Aug 4, 2024
CVE-2020-6462
CVE-2020-6462
Description
Use after free in task scheduling in Google Chrome prior to 81.0.4044.129 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
Affected products
5- osv-coords4 versionspkg:rpm/opensuse/chromium&distro=openSUSE%20Leap%2015.1pkg:rpm/opensuse/chromium&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/opera&distro=openSUSE%20Leap%2015.1%20NonFreepkg:rpm/suse/chromium&distro=SUSE%20Package%20Hub%2015%20SP1
< 81.0.4044.129-bp151.3.75.1+ 3 more
- (no CPE)range: < 81.0.4044.129-bp151.3.75.1
- (no CPE)range: < 93.0.4577.82-1.1
- (no CPE)range: < 68.0.3618.63-lp151.2.15.1
- (no CPE)range: < 81.0.4044.129-bp151.3.75.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- security.gentoo.org/glsa/202005-13mitrevendor-advisoryx_refsource_GENTOO
- www.debian.org/security/2020/dsa-4714mitrevendor-advisoryx_refsource_DEBIAN
- chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_27.htmlmitrex_refsource_MISC
- crbug.com/1064891mitrex_refsource_MISC
News mentions
0No linked articles in our index yet.