First published: Mon Jun 20 2022(Updated: )
Use after free in Sign-In Flow in Google Chrome prior to 105.0.5195.52 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via crafted UI interaction.
Credit: raven at KunLun lab chrome-cve-admin@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Chrome | <105.0.5195.52 | |
Fedoraproject Fedora | =37 | |
Google Chrome | <105.0.5195.52 | 105.0.5195.52 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2022-3058 is rated as a high severity vulnerability due to potential heap corruption exploit.
To fix CVE-2022-3058, update Google Chrome to version 105.0.5195.52 or later.
CVE-2022-3058 affects Google Chrome versions prior to 105.0.5195.52 and Fedora 37.
CVE-2022-3058 can be exploited through specific UI interactions that lead to a use after free vulnerability.
Any user engaging with affected versions of Google Chrome or Fedora could potentially be impacted by CVE-2022-3058.