CVE-2022-3049Race Condition in Google Chrome

Severity
8.8HIGHNVD
EPSS
1.1%
top 22.37%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 26
Latest updateSep 27

Description

Use after free in SplitScreen in Google Chrome on Chrome OS, Lacros prior to 105.0.5195.52 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages5 packages

CVEListV5google/chromeunspecified105.0.5195.52
NVDgoogle/chrome< 105.0.5195.52
debiandebian/chromium< chromium 105.0.5195.52-1 (bookworm)
Debianchromium/chromium< 105.0.5195.52-1~deb11u1+3

Also affects: Fedora 37

🔴Vulnerability Details

2
GHSA
GHSA-j3x6-vg5f-vx5p: Use after free in SplitScreen in Google Chrome on Chrome OS, Lacros prior to 1052022-09-27
OSV
CVE-2022-3049: Use after free in SplitScreen in Google Chrome on Chrome OS, Lacros prior to 1052022-09-26

📋Vendor Advisories

2
Chrome
Stable Channel Update for Desktop: CVE-2022-30492022-08-30
Debian
CVE-2022-3049: chromium - Use after free in SplitScreen in Google Chrome on Chrome OS, Lacros prior to 105...2022