Insufficient data validation in Mojo in Google Chrome prior to 105.0.5195.102 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
References
| Link | Resource |
|---|---|
| https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop.html | Release Notes Vendor Advisory |
| https://crbug.com/1358134 | Permissions Required |
| https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/ | Third Party Advisory |
| https://security.gentoo.org/glsa/202209-23 | Third Party Advisory |
| https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop.html | Release Notes Vendor Advisory |
| https://crbug.com/1358134 | Permissions Required |
| https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/ | Third Party Advisory |
| https://security.gentoo.org/glsa/202209-23 | Third Party Advisory |
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-3075 | US Government Resource |
Configurations
History
24 Oct 2025, 14:10
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-3075 - US Government Resource |
22 Oct 2025, 00:18
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Oct 2025, 20:19
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Oct 2025, 19:19
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
06 Mar 2025, 19:48
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/ - Third Party Advisory |
21 Nov 2024, 07:18
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop.html - Release Notes, Vendor Advisory | |
| References | () https://crbug.com/1358134 - Permissions Required | |
| References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/ - Broken Link | |
| References | () https://security.gentoo.org/glsa/202209-23 - Third Party Advisory |
28 Jun 2024, 14:05
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/ - Broken Link |
27 Oct 2022, 19:54
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2022-09-26 16:15
Updated : 2025-10-24 14:10
NVD link : CVE-2022-3075
Mitre link : CVE-2022-3075
CVE.ORG link : CVE-2022-3075
JSON object : View
Products Affected
fedoraproject
- fedora
- chrome
CWE
CWE-20
Improper Input Validation
