CVE-2022-3058Use After Free in Google Chrome

CWE-416Use After Free6 documents6 sources
Severity
8.8HIGHNVD
EPSS
0.9%
top 24.74%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 26
Latest updateSep 27

Description

Use after free in Sign-In Flow in Google Chrome prior to 105.0.5195.52 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via crafted UI interaction.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages6 packages

CVEListV5google/chromeunspecified105.0.5195.52
NVDgoogle/chrome< 105.0.5195.52
debiandebian/chromium< chromium 105.0.5195.52-1 (bookworm)
Debianchromium/chromium< 105.0.5195.52-1~deb11u1+3

Also affects: Fedora 37

Patches

🔴Vulnerability Details

2
GHSA
GHSA-v748-qg3r-j62x: Use after free in Sign-In Flow in Google Chrome prior to 1052022-09-27
OSV
CVE-2022-3058: Use after free in Sign-In Flow in Google Chrome prior to 1052022-09-26

📋Vendor Advisories

3
Microsoft
Chromium: CVE-2022-3058 Use after free in Sign-In Flow2022-09-13
Chrome
Stable Channel Update for Desktop: CVE-2022-30582022-08-30
Debian
CVE-2022-3058: chromium - Use after free in Sign-In Flow in Google Chrome prior to 105.0.5195.52 allowed a...2022