Описание
Chromium: CVE-2024-0813 Use after free in Reading Mode
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.
FAQ
Why is this Chrome CVE included in the Security Update Guide?
The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.
How can I see the version of the browser?
- In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
- Click on Help and Feedback
- Click on About Microsoft Edge
What is the version information for this release?
Microsoft Edge Channel | Microsoft Edge Version | Date Released | Based on Chromium Version |
---|---|---|---|
Stable | 121.0.2277.83 | 1/25/2024 | 121.0.6167.85/.86 |
Extended Stable | 120.0.2210.160 | 1/25/2024 | 120.0.6099.268 |
Возможность эксплуатации
DOS
EPSS
Связанные уязвимости
Use after free in Reading Mode in Google Chrome prior to 121.0.6167.85 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via specific UI interaction. (Chromium security severity: Medium)
Use after free in Reading Mode in Google Chrome prior to 121.0.6167.85 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via specific UI interaction. (Chromium security severity: Medium)
Use after free in Reading Mode in Google Chrome prior to 121.0.6167.85 ...
Use after free in Reading Mode in Google Chrome prior to 121.0.6167.85 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via specific UI interaction. (Chromium security severity: Medium)
Уязвимость режима чтения (Reading Mode) браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код
EPSS