CVE-2022-1636Use After Free in Google Chrome

Severity
8.8HIGHNVD
EPSS
0.9%
top 24.74%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 26
Latest updateOct 21

Description

Use after free in Performance APIs in Google Chrome prior to 101.0.4951.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages6 packages

CVEListV5google/chromeunspecified101.0.4951.64
NVDgoogle/chrome< 101.0.4951.64
debiandebian/chromium< chromium 101.0.4951.64-1 (bookworm)
Debianchromium/chromium< 101.0.4951.64-1~deb11u1+3

🔴Vulnerability Details

2
GHSA
GHSA-6w2c-2wm7-v55g: Use after free in Performance APIs in Google Chrome prior to 1012022-07-27
OSV
CVE-2022-1636: Use after free in Performance APIs in Google Chrome prior to 1012022-07-26

📋Vendor Advisories

5
Red Hat
kernel: netfilter: conntrack: fix using __this_cpu_add in preemptible2024-10-21
Chrome
Long Term Support Channel Update for ChromeOS: CVE-2022-18592022-05-31
Chrome
Stable Channel Update for Desktop: CVE-2022-16362022-05-10
Microsoft
Chromium: CVE-2022-1636 Use after free in Performance APIs2022-05-10
Debian
CVE-2022-1636: chromium - Use after free in Performance APIs in Google Chrome prior to 101.0.4951.64 allow...2022