CVE-2023-1227

Use after free in Core in Google Chrome on Lacros prior to 111.0.5563.64 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via crafted UI interaction. (Chromium security severity: Medium)
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:google:linux_and_chrome_os:-:*:*:*:*:*:*:*

History

11 Mar 2023, 02:37

Type Values Removed Values Added
CPE cpe:2.3:o:google:linux_and_chrome_os:-:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
CWE CWE-416
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
References (MISC) https://chromereleases.googleblog.com/2023/03/stable-channel-update-for-desktop.html - (MISC) https://chromereleases.googleblog.com/2023/03/stable-channel-update-for-desktop.html - Release Notes
References (MISC) https://crbug.com/1348791 - (MISC) https://crbug.com/1348791 - Permissions Required
First Time Google chrome
Google linux And Chrome Os
Google

07 Mar 2023, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-03-07 22:15

Updated : 2023-12-10 14:48


NVD link : CVE-2023-1227

Mitre link : CVE-2023-1227

CVE.ORG link : CVE-2023-1227


JSON object : View

Products Affected

google

  • chrome
  • linux_and_chrome_os
CWE
CWE-416

Use After Free