CVE-2022-0974Use After Free in Google Chrome

CWE-416Use After Free7 documents6 sources
Severity
8.8HIGHNVD
EPSS
0.8%
top 26.15%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 21
Latest updateJul 22

Description

Use after free in Splitscreen in Google Chrome on Chrome OS prior to 99.0.4844.74 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages6 packages

CVEListV5google/chromeunspecified99.0.4844.74
NVDgoogle/chrome< 99.0.4844.74
debiandebian/chromium< chromium 99.0.4844.74-1 (bookworm)
Debianchromium/chromium< 99.0.4844.74-1~deb11u1+3

Patches

🔴Vulnerability Details

2
GHSA
GHSA-6r9w-h2x2-322m: Use after free in Splitscreen in Google Chrome on Chrome OS prior to 992022-07-22
OSV
CVE-2022-0974: Use after free in Splitscreen in Google Chrome on Chrome OS prior to 992022-07-21

📋Vendor Advisories

4
Chrome
Long Term Support Channel Update: CVE-2022-09772022-04-06
Chrome
Stable Channel Update for Desktop: CVE-2022-09742022-03-15
Microsoft
Chromium: CVE-2022-0974 Use after free in Splitscreen2022-03-08
Debian
CVE-2022-0974: chromium - Use after free in Splitscreen in Google Chrome on Chrome OS prior to 99.0.4844.7...2022