First published: Fri Jul 01 2022(Updated: )
WebRTC. A memory corruption issue was addressed with improved state management.
Credit: chrome-cve-admin@google.com chrome-cve-admin@google.com Jan Vojtesek the Avast Threat Intelligence team chrome-cve-admin@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Safari | <15.6 | 15.6 |
Google Chrome | <103.0.5060.114 | |
Fedoraproject Extra Packages For Enterprise Linux | =8.0 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
WebKitGTK WebKitGTK | <2.36.5 | |
Wpewebkit Wpe Webkit | <2.36.5 | |
Apple iPadOS | <15.6 | |
Apple iPhone OS | <15.6 | |
Apple Mac OS X | <10.15.7 | |
Apple Mac OS X | =10.15.7 | |
Apple Mac OS X | =10.15.7-security_update_2020 | |
Apple Mac OS X | =10.15.7-security_update_2020-001 | |
Apple Mac OS X | =10.15.7-security_update_2020-005 | |
Apple Mac OS X | =10.15.7-security_update_2020-007 | |
Apple Mac OS X | =10.15.7-security_update_2021-001 | |
Apple Mac OS X | =10.15.7-security_update_2021-002 | |
Apple Mac OS X | =10.15.7-security_update_2021-003 | |
Apple Mac OS X | =10.15.7-security_update_2021-004 | |
Apple Mac OS X | =10.15.7-security_update_2021-005 | |
Apple Mac OS X | =10.15.7-security_update_2021-006 | |
Apple Mac OS X | =10.15.7-security_update_2021-007 | |
Apple Mac OS X | =10.15.7-security_update_2021-008 | |
Apple Mac OS X | =10.15.7-security_update_2022-001 | |
Apple Mac OS X | =10.15.7-security_update_2022-002 | |
Apple Mac OS X | =10.15.7-security_update_2022-003 | |
Apple Mac OS X | =10.15.7-security_update_2022-004 | |
Apple macOS | <11.6.8 | |
Apple macOS | >=12.0<12.5 | |
Apple tvOS | <15.6 | |
Apple watchOS | <8.7 | |
Webrtc Project Webrtc | ||
Apple iOS | <15.6 | 15.6 |
Apple iPadOS | <15.6 | 15.6 |
Apple macOS Monterey | <12.5 | 12.5 |
Google Chrome | <103.0.5060.114 | 103.0.5060.114 |
WebRTC WebRTC | ||
<103.0.5060.114 | ||
=8.0 | ||
=35 | ||
=36 | ||
<2.36.5 | ||
<2.36.5 | ||
<15.6 | ||
<15.6 | ||
<10.15.7 | ||
=10.15.7 | ||
=10.15.7-security_update_2020 | ||
=10.15.7-security_update_2020-001 | ||
=10.15.7-security_update_2020-005 | ||
=10.15.7-security_update_2020-007 | ||
=10.15.7-security_update_2021-001 | ||
=10.15.7-security_update_2021-002 | ||
=10.15.7-security_update_2021-003 | ||
=10.15.7-security_update_2021-004 | ||
=10.15.7-security_update_2021-005 | ||
=10.15.7-security_update_2021-006 | ||
=10.15.7-security_update_2021-007 | ||
=10.15.7-security_update_2021-008 | ||
=10.15.7-security_update_2022-001 | ||
=10.15.7-security_update_2022-002 | ||
=10.15.7-security_update_2022-003 | ||
=10.15.7-security_update_2022-004 | ||
<11.6.8 | ||
>=12.0<12.5 | ||
<15.6 | ||
<8.7 | ||
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
The CVE ID for this vulnerability is CVE-2022-2294.
The title of this vulnerability is WebRTC Heap Buffer Overflow Vulnerability.
This vulnerability allows an attacker to perform shellcode execution.
Web browsers using WebRTC, including Google Chrome, Apple macOS Monterey (up to version 12.5), Apple iOS (up to version 15.6), Apple iPadOS (up to version 15.6), and Apple Safari (up to version 15.6).
Yes, you can find references related to this vulnerability at the following links: [Link 1](https://groups.google.com/g/discuss-webrtc/c/5KBtZx2gvcQ), [Link 2](https://support.apple.com/en-us/HT213345), [Link 3](https://support.apple.com/en-us/HT213341).
The CWE ID for this vulnerability is CWE-119.