CVE Vulnerabilities

CVE-2024-1694

Use of Function with Inconsistent Implementations

Published: Jun 07, 2024 | Modified: Aug 01, 2024
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM

Inappropriate implementation in Google Updator prior to 1.3.36.351 in Google Chrome allowed a local attacker to bypass discretionary access control via a malicious file. (Chromium security severity: High)

Weakness

The code uses a function that has inconsistent implementations across operating systems and versions.

Affected Software

Name Vendor Start Version End Version
Chromium-browser Ubuntu upstream *

Extended Description

The use of inconsistent implementations can cause changes in behavior when the code is ported or built under a different environment than the programmer expects, which can lead to security problems in some cases. The implementation of many functions varies by platform, and at times, even by different versions of the same platform. Implementation differences can include:

Potential Mitigations

References