CVE-2023-2722Use After Free in Google Chrome

Severity
8.8HIGHNVD
EPSS
0.3%
top 50.55%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 16
Latest updateDec 30

Description

Use after free in Autofill UI in Google Chrome on Android prior to 113.0.5672.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages7 packages

CVEListV5google/chrome113.0.5672.126113.0.5672.126
NVDgoogle/chrome< 113.0.5672.126
debiandebian/chromium< chromium 113.0.5672.126-1 (bookworm)
Debianchromium/chromium< 113.0.5672.126-1~deb11u1+3
Linuxlinux/linux_kernel4.12.04.14.316+6

Also affects: Debian Linux 11.0, Fedora 37, 38

🔴Vulnerability Details

3
OSV
net: Fix load-tearing on sk->sk_stamp in sock_recv_cmsgs().2025-12-30
GHSA
GHSA-9gjv-mqxv-j44m: Use after free in Autofill UI in Google Chrome on Android prior to 1132023-05-16
OSV
CVE-2023-2722: Use after free in Autofill UI in Google Chrome on Android prior to 1132023-05-16

📋Vendor Advisories

3
Red Hat
kernel: net: Fix load-tearing on sk->sk_stamp in sock_recv_cmsgs()2025-12-30
Microsoft
Chromium: CVE-2023-2722 Use after free in Autofill UI2023-05-09
Debian
CVE-2023-2722: chromium - Use after free in Autofill UI in Google Chrome on Android prior to 113.0.5672.12...2023