CVE-2022-4177Use After Free in Google Chrome

CWE-416Use After Free7 documents7 sources
Severity
8.8HIGHNVD
EPSS
0.1%
top 73.76%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 30
Latest updateJun 18

Description

Use after free in Extensions in Google Chrome prior to 108.0.5359.71 allowed an attacker who convinced a user to install an extension to potentially exploit heap corruption via a crafted Chrome Extension and UI interaction. (Chromium security severity: High)

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages6 packages

CVEListV5google/chromeunspecified108.0.5359.71
NVDgoogle/chrome< 108.0.5359.71
debiandebian/chromium< chromium 108.0.5359.71-1 (bookworm)
Debianchromium/chromium< 108.0.5359.71-2~deb11u1+3

🔴Vulnerability Details

2
GHSA
GHSA-32c8-f69v-cf4f: Use after free in Extensions in Google Chrome prior to 1082022-11-30
OSV
CVE-2022-4177: Use after free in Extensions in Google Chrome prior to 1082022-11-30

📋Vendor Advisories

4
Red Hat
kernel: kunit: executor: Fix a memory leak on failure in kunit_filter_tests2025-06-18
Microsoft
Chromium: CVE-2022-4177 Use after free in Extensions2022-12-13
Chrome
Stable Channel Update for Desktop: CVE-2022-41772022-11-29
Debian
CVE-2022-4177: chromium - Use after free in Extensions in Google Chrome prior to 108.0.5359.71 allowed an ...2022