CVE-2023-2930Use After Free in Google Chrome

Severity
8.8HIGHNVD
EPSS
0.1%
top 70.23%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 30
Latest updateDec 24

Description

Use after free in Extensions in Google Chrome prior to 114.0.5735.90 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages7 packages

CVEListV5google/chrome114.0.5735.90114.0.5735.90
NVDgoogle/chrome< 114.0.5735.90
debiandebian/chromium< chromium 114.0.5735.90-2~deb12u1 (bookworm)
Debianchromium/chromium< 114.0.5735.90-2~deb11u1+3

🔴Vulnerability Details

3
OSV
scsi: qla2xxx: Fix DMA-API call trace on NVMe LS requests2025-12-24
GHSA
GHSA-44xq-533g-gj79: Use after free in Extensions in Google Chrome prior to 1142023-05-31
OSV
CVE-2023-2930: Use after free in Extensions in Google Chrome prior to 1142023-05-30

📋Vendor Advisories

4
Red Hat
kernel: scsi: qla2xxx: Fix DMA-API call trace on NVMe LS requests2025-12-24
Microsoft
Chromium: CVE-2023-2930 Use after free in Extensions2023-06-13
Chrome
Stable Channel Update for Desktop: CVE-2023-29292023-05-30
Debian
CVE-2023-2930: chromium - Use after free in Extensions in Google Chrome prior to 114.0.5735.90 allowed an ...2023