← Back to CVEs
CVE-2024-2626
MEDIUM6.5
Description
Out of bounds read in Swiftshader in Google Chrome prior to 123.0.6312.58 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Medium)
CVE Details
CVSS v3.1 Score6.5
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionREQUIRED
Published3/20/2024
Last Modified3/26/2025
Sourcenvd
Honeypot Sightings0
Affected Products
fedoraproject:fedoragoogle:chrome
Weaknesses (CWE)
CWE-125CWE-125
References
https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_19.html(chrome-cve-admin@google.com)
https://issues.chromium.org/issues/40945098(chrome-cve-admin@google.com)
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D3Z6CRRN4J3IUZPJZVURGMRBN6WFPTU/(chrome-cve-admin@google.com)
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JINDYFB3MPH43ECTI72BV63K4RXSG22/(chrome-cve-admin@google.com)
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AQVVW4FLQDIJ2UABGXK2SMS5AUGT54FM/(chrome-cve-admin@google.com)
https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_19.html(af854a3a-2127-422b-91ae-364da2661108)
https://issues.chromium.org/issues/40945098(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D3Z6CRRN4J3IUZPJZVURGMRBN6WFPTU/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JINDYFB3MPH43ECTI72BV63K4RXSG22/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AQVVW4FLQDIJ2UABGXK2SMS5AUGT54FM/(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.