Use after free in Passwords in Google Chrome prior to 117.0.5938.132 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via crafted UI interaction. (Chromium security severity: High)
References
Link | Resource |
---|---|
https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_27.html | Release Notes Vendor Advisory |
https://crbug.com/1478889 | Permissions Required |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4MFWDFJSSIFKWKNOCTQCFUNZWAXUCSS4/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWEJYS5NC7KVFYU3OAMPKQDYN6JQGVK6/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/ | Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/202401-34 | |
https://www.debian.org/security/2023/dsa-5508 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: Chrome
Published: 2023-09-28T15:23:18.607Z
Updated: 2023-09-28T15:23:18.607Z
Reserved: 2023-09-26T00:14:20.345Z
Link: CVE-2023-5186
JSON object: View
NVD Information
Status : Modified
Published: 2023-09-28T16:15:10.760
Modified: 2024-01-31T17:15:17.980
Link: CVE-2023-5186
JSON object: View
Redhat Information
No data.
CWE