CVE-2022-2613Use After Free in Google Chrome

CWE-416Use After Free5 documents5 sources
Severity
8.8HIGHNVD
EPSS
1.1%
top 21.94%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 12
Latest updateAug 13

Description

Use after free in Input in Google Chrome on Chrome OS prior to 104.0.5112.79 allowed a remote attacker who convinced a user to enage in specific user interactions to potentially exploit heap corruption via specific UI interactions.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages5 packages

CVEListV5google/chromeunspecified104.0.5112.79
NVDgoogle/chrome< 104.0.5112.79
debiandebian/chromium< chromium 104.0.5112.79-1 (bookworm)
Debianchromium/chromium< 104.0.5112.79-1~deb11u1+3

Also affects: Fedora 37

🔴Vulnerability Details

2
GHSA
GHSA-m3ww-86w6-hqwq: Use after free in Input in Google Chrome on Chrome OS prior to 1042022-08-13
OSV
CVE-2022-2613: Use after free in Input in Google Chrome on Chrome OS prior to 1042022-08-12

📋Vendor Advisories

2
Chrome
Stable Channel Update for Desktop: CVE-2022-26132022-08-02
Debian
CVE-2022-2613: chromium - Use after free in Input in Google Chrome on Chrome OS prior to 104.0.5112.79 all...2022