{"id":"CVE-2024-0223","details":"Heap buffer overflow in ANGLE in Google Chrome prior to 120.0.6099.199 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","modified":"2026-03-13T07:48:56.557193Z","published":"2024-01-04T02:15:28.987Z","related":["MGASA-2024-0011","openSUSE-SU-2024:0016-1","openSUSE-SU-2024:0020-1","openSUSE-SU-2024:13583-1","openSUSE-SU-2024:13585-1"],"references":[{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K/"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP/"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202401-34"},{"type":"ADVISORY","url":"https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop.html"},{"type":"REPORT","url":"https://crbug.com/1505009"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-0223.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"120.0.6099.199"}]},{"events":[{"introduced":"0"},{"last_affected":"38"}]},{"events":[{"introduced":"0"},{"last_affected":"39"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}