CVE-2024-3171Use After Free in Google Chrome

Severity
8.8HIGHNVD
EPSS
1.1%
top 22.08%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJul 16
Latest updateSep 4

Description

Use after free in Accessibility in Google Chrome prior to 122.0.6261.57 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via specific UI gestures. (Chromium security severity: Medium)

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages3 packages

CVEListV5google/chrome122.0.6261.57122.0.6261.57
NVDgoogle/chrome< 122.0.6261.57
Debianchromium/chromium< 122.0.6261.57-1~deb12u1+2

🔴Vulnerability Details

3
GHSA
GHSA-f2wx-vcrf-76pc: Use after free in Accessibility in Google Chrome prior to 1222024-07-17
CVEList
CVE-2024-3171: Use after free in Accessibility in Google Chrome prior to 1222024-07-16
OSV
CVE-2024-3171: Use after free in Accessibility in Google Chrome prior to 1222024-07-16

📋Vendor Advisories

3
Red Hat
kernel: mm, slub: do not call do_slab_free for kfence object2024-09-04
Chrome
Stable Channel Update for Desktop: CVE-2024-31712024-02-20
Debian
CVE-2024-3171: chromium - Use after free in Accessibility in Google Chrome prior to 122.0.6261.57 allowed ...2024
CVE-2024-3171 — Use After Free in Google Chrome | cvebase