Use after free in Splitscreen in Google Chrome on ChromeOS prior to 115.0.5790.131 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via crafted UI interactions. (Chromium security severity: High)
References
Link | Resource |
---|---|
https://chromereleases.googleblog.com/2023/07/stable-channel-update-for-chromeos.html | |
https://crbug.com/1451803 | Exploit Issue Tracking Permissions Required Vendor Advisory |
https://chromereleases.googleblog.com/2023/07/stable-channel-update-for-chromeos.html | |
https://crbug.com/1451803 | Exploit Issue Tracking Permissions Required Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 08:17
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://chromereleases.googleblog.com/2023/07/stable-channel-update-for-chromeos.html - | |
References | () https://crbug.com/1451803 - Exploit, Issue Tracking, Permissions Required, Vendor Advisory |
Information
Published : 2023-08-01 23:15
Updated : 2024-11-21 08:17
NVD link : CVE-2023-3729
Mitre link : CVE-2023-3729
CVE.ORG link : CVE-2023-3729
JSON object : View
Products Affected
- chrome
- chrome_os
CWE
CWE-416
Use After Free