CVE-2024-3832Improper Restriction of Operations within the Bounds of a Memory Buffer in Google Chrome

Severity
8.8HIGHNVD
EPSS
5.8%
top 9.52%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 17
Latest updateJul 30

Description

Object corruption in V8 in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High)

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages3 packages

CVEListV5google/chrome124.0.6367.60124.0.6367.60
NVDgoogle/chrome< 124.0.6367.60
Debianchromium/chromium< 124.0.6367.60-1~deb12u1+2

Also affects: Fedora 38, 39, 40

🔴Vulnerability Details

3
CVEList
CVE-2024-3832: Object corruption in V8 in Google Chrome prior to 1242024-04-17
OSV
CVE-2024-3832: Object corruption in V8 in Google Chrome prior to 1242024-04-17
GHSA
GHSA-qqpr-fvmc-87j3: Object corruption in V8 in Google Chrome prior to 1242024-04-17

📋Vendor Advisories

5
Red Hat
kernel: drm/xe: Add outer runtime_pm protection to xe_live_ktest@xe_dma_buf2024-07-30
Chrome
Stable Channel Update for ChromeOS / ChromeOS Flex: CVE-2024-38322024-05-01
Chrome
Stable Channel Update for Desktop: CVE-2024-26252024-04-16
Microsoft
Chromium: CVE-2024-3832 Object corruption in V82024-04-09
Debian
CVE-2024-3832: chromium - Object corruption in V8 in Google Chrome prior to 124.0.6367.60 allowed a remote...2024
CVE-2024-3832 — Google Chrome vulnerability | cvebase