First published: Wed Oct 12 2022(Updated: )
Use after free in Sign-In in Google Chrome prior to 108.0.5359.71 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via profile destruction. (Chromium security severity: Medium)
Credit: Jaehun Jeong @n3sk Theori chrome-cve-admin@google.com chrome-cve-admin@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Chrome | <108.0.5359.71 | |
Google Chrome | <108.0.5359.71 | 108.0.5359.71 |
<108.0.5359.71 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The severity of CVE-2022-4191 is classified as Medium.
To fix CVE-2022-4191, update Google Chrome to version 108.0.5359.71 or later.
CVE-2022-4191 is caused by a use-after-free vulnerability in the Sign-In feature of Google Chrome.
CVE-2022-4191 can allow a remote attacker to exploit heap corruption through specific user interactions.
Google Chrome versions prior to 108.0.5359.71 are affected by CVE-2022-4191.