CVE-2020-6533
📋 TL;DR
This is a type confusion vulnerability in Chrome's V8 JavaScript engine that could allow a remote attacker to execute arbitrary code or cause heap corruption by tricking the browser into misinterpreting object types. It affects users running Chrome versions before 84.0.4147.89 who visit malicious websites.
💻 Affected Systems
- Google Chrome
- Chromium-based browsers
📦 What is this software?
Backports Sle by Opensuse
Chrome by Google
Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...
Learn more about Chrome →Fedora by Fedoraproject
Fedora by Fedoraproject
Leap by Opensuse
Leap by Opensuse
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to full system compromise, data theft, or ransomware deployment.
Likely Case
Browser crash (denial of service) or limited code execution within browser sandbox.
If Mitigated
No impact if patched; sandboxing may limit damage if exploited.
🎯 Exploit Status
Type confusion vulnerabilities in V8 are frequently exploited in the wild. No public PoC available but likely used by threat actors.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 84.0.4147.89 and later
Vendor Advisory: https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html
Restart Required: Yes
Instructions:
1. Open Chrome. 2. Click menu (three dots) > Help > About Google Chrome. 3. Chrome will automatically check for and install updates. 4. Click 'Relaunch' to restart Chrome with the patched version.
🔧 Temporary Workarounds
Disable JavaScript
allPrevents exploitation by disabling JavaScript execution in Chrome.
chrome://settings/content/javascript > Block
Use Site Isolation
allEnables site isolation to limit impact if exploited.
chrome://flags/#enable-site-per-process > Enable
🧯 If You Can't Patch
- Use alternative browser temporarily
- Restrict browsing to trusted websites only
🔍 How to Verify
Check if Vulnerable:
Check Chrome version: If version is less than 84.0.4147.89, system is vulnerable.
Check Version:
google-chrome --version (Linux) or chrome://version (all platforms)
Verify Fix Applied:
Confirm Chrome version is 84.0.4147.89 or higher.
📡 Detection & Monitoring
Log Indicators:
- Chrome crash reports
- Unexpected process termination in system logs
Network Indicators:
- Requests to known malicious domains hosting exploit code
SIEM Query:
source="chrome_crash_logs" AND message="V8" AND severity="CRITICAL"
🔗 References
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html
- https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html
- https://crbug.com/1069964
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/
- https://security.gentoo.org/glsa/202007-08
- https://security.gentoo.org/glsa/202101-30
- https://www.debian.org/security/2021/dsa-4824
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html
- https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html
- https://crbug.com/1069964
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/
- https://security.gentoo.org/glsa/202007-08
- https://security.gentoo.org/glsa/202101-30
- https://www.debian.org/security/2021/dsa-4824