chrome is vulnerable to a Use-after-Free. The vulnerability is due to improper implementation of QUIC (Quick UDP Internet Connections) protocol within Google Chrome, allows a remote attacker who has compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.
chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html
issues.chromium.org/issues/41491379
lists.fedoraproject.org/archives/list/[email protected]/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/
lists.fedoraproject.org/archives/list/[email protected]/message/IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7/
lists.fedoraproject.org/archives/list/[email protected]/message/M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ/
lists.fedoraproject.org/archives/list/[email protected]/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/
lists.fedoraproject.org/archives/list/[email protected]/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/
lists.fedoraproject.org/archives/list/[email protected]/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/
security-tracker.debian.org/tracker/CVE-2024-3837