Use after free in Core in Google Chrome on Lacros prior to 111.0.5563.64 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via crafted UI interaction. (Chromium security severity: Medium)
References
Link | Resource |
---|---|
https://chromereleases.googleblog.com/2023/03/stable-channel-update-for-desktop.html | Release Notes |
https://crbug.com/1348791 | Permissions Required |
Configurations
Configuration 1 (hide)
AND |
|
History
11 Mar 2023, 02:37
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:google:linux_and_chrome_os:-:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:* |
|
CWE | CWE-416 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
References | (MISC) https://chromereleases.googleblog.com/2023/03/stable-channel-update-for-desktop.html - Release Notes | |
References | (MISC) https://crbug.com/1348791 - Permissions Required | |
First Time |
Google chrome
Google linux And Chrome Os |
07 Mar 2023, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-03-07 22:15
Updated : 2023-12-10 14:48
NVD link : CVE-2023-1227
Mitre link : CVE-2023-1227
CVE.ORG link : CVE-2023-1227
JSON object : View
Products Affected
- chrome
- linux_and_chrome_os
CWE
CWE-416
Use After Free