Use after free in Extensions in Google Chrome prior to 104.0.5112.79 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via specific UI interactions.
References
Link | Resource |
---|---|
https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop.html | Release Notes |
https://crbug.com/1323449 | Exploit Issue Tracking Mailing List Vendor Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/ | Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/202208-35 | Third Party Advisory |
Configurations
History
08 Aug 2023, 14:21
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-362 |
27 Oct 2022, 18:50
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:* | |
References |
|
|
References | (GENTOO) https://security.gentoo.org/glsa/202208-35 - Third Party Advisory |
21 Aug 2022, 08:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
15 Aug 2022, 19:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
CPE | cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:* | |
CWE | CWE-416 | |
References | (MISC) https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop.html - Vendor Advisory | |
References | (MISC) https://crbug.com/1323449 - Issue Tracking, Permissions Required, Vendor Advisory |
12 Aug 2022, 21:43
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-08-12 20:15
Updated : 2024-02-02 16:39
NVD link : CVE-2022-2621
Mitre link : CVE-2022-2621
CVE.ORG link : CVE-2022-2621
JSON object : View
Products Affected
fedoraproject
- fedora
- chrome
CWE
CWE-416
Use After Free