Use After Free in atom-shell
CVE-2024-9959
- atom-shell
- chromium
- chromiumembeddedframework.runtime
- electron
- electron-nightly
- electron-prebuilt
- org.webjars.npm:electron
- org.webjars.npm:electron-prebuilt
Summary
Use after free in DevTools in Google Chrome versions prior to 130.0.6723.58 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted Chrome Extension.
- LOW
- NETWORK
- HIGH
- UNCHANGED
- REQUIRED
- NONE
- HIGH
- HIGH
CWE-416 - Use After Free
Use-after-free (UaF) vulnerability occurs when the application is using a pointer to memory that has been freed. Any attempt to read/write to a buffer after it is de-allocated allows memory corruption, sensitive information exposure, and can potentially lead to arbitrary code execution.
References
Advisory Timeline
- Published