CVE-2024-10827Use After Free in Google Chrome

CWE-416Use After Free10 documents9 sources
Severity
8.8HIGHNVD
EPSS
0.8%
top 25.27%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 6
Latest updateNov 21

Description

Use after free in Serial in Google Chrome prior to 130.0.6723.116 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages4 packages

CVEListV5google/chrome130.0.6723.116130.0.6723.116
NVDgoogle/chrome< 130.0.6723.116
Debianchromium/chromium< 130.0.6723.116-1~deb12u1+2

🔴Vulnerability Details

3
GHSA
GHSA-58wv-w3hc-2c76: Use after free in Serial in Google Chrome prior to 1302024-11-06
CVEList
CVE-2024-10827: Use after free in Serial in Google Chrome prior to 1302024-11-06
OSV
CVE-2024-10827: Use after free in Serial in Google Chrome prior to 1302024-11-06

📋Vendor Advisories

5
Chrome
Long Term Support Channel Update for ChromeOS: CVE-2024-108272024-11-21
Palo Alto
PAN-SA-2024-0016 Chromium: Monthly Vulnerability Updates2024-11-13
Microsoft
Chromium: CVE-2024-10827 Use after free in Serial2024-11-12
Chrome
Stable Channel Update for Desktop: CVE-2024-108262024-11-05
Debian
CVE-2024-10827: chromium - Use after free in Serial in Google Chrome prior to 130.0.6723.116 allowed a remo...2024

🕵️Threat Intelligence

1
Bleepingcomputer
Microsoft November 2024 Patch Tuesday fixes 4 zero-days, 89 flaws2024-11-12
CVE-2024-10827 — Use After Free in Google Chrome | cvebase