Insufficient validation of untrusted input in Extensions in Google Chrome prior to 113.0.5672.63 allowed an attacker who convinced a user to install a malicious extension to bypass file access checks via a crafted HTML page. (Chromium security severity: Medium)
CPE | Name | Operator | Version |
---|---|---|---|
debian_linux | eq | 11.0 | |
fedora | eq | 36 | |
fedora | eq | 37 | |
fedora | eq | 38 | |
chrome | lt | 113.0.5672.63 |
chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop.html
crbug.com/1419732
lists.fedoraproject.org/archives/list/[email protected]/message/6P5RJ6UD37IPBWU3GPQNMIUFVOVCGSLY/
lists.fedoraproject.org/archives/list/[email protected]/message/U3V6GPGMY6ZWVWPECMQGGOKQVATXJ5BA/
lists.fedoraproject.org/archives/list/[email protected]/message/Z4JI552XDFD6DYFU6WNCRBCAXWOFOOSF/
security.gentoo.org/glsa/202309-17
www.debian.org/security/2023/dsa-5398