CVE-2022-2614Use After Free in Google Chrome

CWE-416Use After Free7 documents6 sources
Severity
8.8HIGHNVD
EPSS
0.8%
top 25.80%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 12
Latest updateSep 9

Description

Use after free in Sign-In Flow in Google Chrome prior to 104.0.5112.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages6 packages

CVEListV5google/chromeunspecified104.0.5112.79
NVDgoogle/chrome< 104.0.5112.79
debiandebian/chromium< chromium 104.0.5112.79-1 (bookworm)
Debianchromium/chromium< 104.0.5112.79-1~deb11u1+3

Also affects: Fedora 37

🔴Vulnerability Details

2
GHSA
GHSA-7ggx-3w8m-q494: Use after free in Sign-In Flow in Google Chrome prior to 1042022-08-13
OSV
CVE-2022-2614: Use after free in Sign-In Flow in Google Chrome prior to 1042022-08-12

📋Vendor Advisories

4
Chrome
Long Term Support Candidate Channel for ChromeOS: CVE-2022-26142022-09-09
Microsoft
Chromium: CVE-2022-2614 Use after free in Sign-In Flow2022-08-09
Chrome
Stable Channel Update for Desktop: CVE-2022-26132022-08-02
Debian
CVE-2022-2614: chromium - Use after free in Sign-In Flow in Google Chrome prior to 104.0.5112.79 allowed a...2022