Vulnerabilities > CVE-2024-3837 - Use After Free vulnerability in Google Chrome
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
Use after free in QUIC in Google Chrome prior to 124.0.6367.60 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
Vulnerable Configurations
Common Weakness Enumeration (CWE)
References
- https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html
- https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html
- https://issues.chromium.org/issues/41491379
- https://issues.chromium.org/issues/41491379
- https://lists.fedoraproject.org/archives/list/[email protected]/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/
- https://lists.fedoraproject.org/archives/list/[email protected]/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/
- https://lists.fedoraproject.org/archives/list/[email protected]/message/IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7/
- https://lists.fedoraproject.org/archives/list/[email protected]/message/IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7/
- https://lists.fedoraproject.org/archives/list/[email protected]/message/M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ/
- https://lists.fedoraproject.org/archives/list/[email protected]/message/M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ/
- https://lists.fedoraproject.org/archives/list/[email protected]/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/
- https://lists.fedoraproject.org/archives/list/[email protected]/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/
- https://lists.fedoraproject.org/archives/list/[email protected]/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/
- https://lists.fedoraproject.org/archives/list/[email protected]/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/
- https://lists.fedoraproject.org/archives/list/[email protected]/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/
- https://lists.fedoraproject.org/archives/list/[email protected]/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/