NA

CVE-2023-6348

Published: 29/11/2023 Updated: 31/01/2024
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 0

Vulnerability Summary

Type Confusion in Spellcheck in Google Chrome before 119.0.6045.199 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

google chrome

debian debian linux 11.0

debian debian linux 12.0

fedoraproject fedora 39

Vendor Advisories

Multiple security issues were discovered in Chromium, which could result in the execution of arbitrary code, denial of service or information disclosure For the oldstable distribution (bullseye), these problems have been fixed in version 11906045199-1~deb11u1 For the stable distribution (bookworm), these problems have been fixed in version 119 ...
The Stable channel has been updated to 11906045199 for Mac and Linux and 11906045199/200 for Windows, which will roll out over the coming days/weeks A full list of changes in this build is available in the log Security Fixes and RewardsNote: Access to bug details and links may be kept restricted until a majority of users are ...

Recent Articles

Uh-oh, update Google Chrome – exploit already out there for one of these 6 security holes
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources Plus: 3 critical CVEs in Zyxel NAS devices

Google has rolled out six Chrome security fixes including one emergency patch for a bug for which exploit code is already out there. You're encouraged to thus grab the latest updates for the browser. This latest zero-day flaw, tracked as CVE-2023-6345, is a high-severity integer overflow vulnerability in Skia, a popular graphics library used by Chrome. To exploit this bug, an attacker would need to have already compromised the renderer process, at which point they may be able to perform a sandbo...