CVE-2023-4429Use After Free in Google Chrome

CWE-416Use After Free7 documents6 sources
Severity
8.8HIGHNVD
EPSS
0.4%
top 41.18%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 23
Latest updateSep 27

Description

Use after free in Loader in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages6 packages

CVEListV5google/chrome116.0.5845.110116.0.5845.110
NVDgoogle/chrome< 116.0.5845.110
debiandebian/chromium< chromium 116.0.5845.110-1~deb12u1 (bookworm)
Debianchromium/chromium< 116.0.5845.110-1~deb11u1+3

Also affects: Debian Linux 11.0, 12.0, Fedora 37, 38, 39

🔴Vulnerability Details

2
OSV
CVE-2023-4429: Use after free in Loader in Google Chrome prior to 1162023-08-23
GHSA
GHSA-r43m-48vw-xgp3: Use after free in Loader in Google Chrome prior to 1162023-08-23

📋Vendor Advisories

4
Chrome
Long Term Support (LTS) channel for ChromeOS - Major update from 108 -> 114: CVE-2023-44292023-09-27
Chrome
Stable Channel Update for Desktop: CVE-2023-44302023-08-22
Microsoft
Chromium: CVE-2023-4429: Use after free in Loader2023-08-08
Debian
CVE-2023-4429: chromium - Use after free in Loader in Google Chrome prior to 116.0.5845.110 allowed a remo...2023