Use after free in Network in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who has elicited a browser shutdown to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
References
Link | Resource |
---|---|
https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html | Release Notes Vendor Advisory |
https://crbug.com/1465833 | Permissions Required |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/ | |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/ | Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/202401-34 | |
https://www.debian.org/security/2023/dsa-5479 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: Chrome
Published: 2023-08-15T17:07:10.692Z
Updated: 2023-08-15T17:07:10.692Z
Reserved: 2023-08-15T00:03:25.680Z
Link: CVE-2023-4351
JSON object: View
NVD Information
Status : Modified
Published: 2023-08-15T18:15:11.260
Modified: 2024-01-31T17:15:14.517
Link: CVE-2023-4351
JSON object: View
Redhat Information
No data.
CWE