CVE-2023-2461Use After Free in Google Chrome

CWE-416Use After Free5 documents5 sources
Severity
8.8HIGHNVD
EPSS
0.6%
top 31.83%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 3
Latest updateMay 9

Description

Use after free in OS Inputs in Google Chrome on ChromeOS prior to 113.0.5672.63 allowed a remote attacker who convinced a user to enage in specific UI interaction to potentially exploit heap corruption via crafted UI interaction. (Chromium security severity: Medium)

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages5 packages

CVEListV5google/chrome113.0.5672.63113.0.5672.63
NVDgoogle/chrome< 113.0.5672.63
debiandebian/chromium< chromium 113.0.5672.63-1 (bookworm)
Debianchromium/chromium< 113.0.5672.63-1~deb11u1+3

Also affects: Debian Linux 11.0, Fedora 36, 37, 38

🔴Vulnerability Details

2
OSV
CVE-2023-2461: Use after free in OS Inputs in Google Chrome on ChromeOS prior to 1132023-05-03
GHSA
GHSA-6cmv-m333-v5r3: Use after free in OS Inputs in Google Chrome on ChromeOS prior to 1132023-05-03

📋Vendor Advisories

2
Chrome
Stable Channel Update for ChromeOS / ChromeOS Flex: CVE-2023-24612023-05-09
Debian
CVE-2023-2461: chromium - Use after free in OS Inputs in Google Chrome on ChromeOS prior to 113.0.5672.63 ...2023