6.5
CVSSv3

CVE-2022-2612

Published: 12/08/2022 Updated: 07/11/2023
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 0

Vulnerability Summary

Side-channel information leakage in Keyboard input in Google Chrome before 104.0.5112.79 allowed a remote attacker who had compromised the renderer process to obtain potentially sensitive information from process memory via a crafted HTML page.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

google chrome

fedoraproject fedora 37

Vendor Advisories

Multiple security issues were discovered in Chromium, which could result in the execution of arbitrary code, denial of service or information disclosure For the stable distribution (bullseye), these problems have been fixed in version 1040511279-1~deb11u1 We recommend that you upgrade your chromium packages For the detailed security status of ...
A new LTS Candidate, LTC- 10205005177 (Platform Version: 146951280),  is rolling out for most ChromeOS devices Release notes for LTC-102 can be found here Want to know more about Long-term Support? Click here This update includes the following Security fixes:1327087HighCVE-2022-2296Use after free in C ...
LTS-96 has been updated in the LTS channel to 9604664219 (Platform Version: 142681040) for most ChromeOS devices Want to know more about Long-term Support? Click here This update includes the following Security fixes:1338135 High CVE-2022-2857 Use after free in Blink1329794 High CVE-2022-2998&nbsp ...
The Chrome team is delighted to announce the promotion of Chrome 104 to the stable channel for Windows, Mac and LinuxChrome 104 is also promoted to our new extended stable channel for Windows and Mac This will roll out over the coming days/weeksChrome 1040511279 ( Mac/linux) and 1040511279/80/81 ( Windows)  co ...

Github Repositories

Layered Binary Templating

Layered Binary Templating Attacks PoC Repo of CVE-2022-2612 Side-channel information leakage in Keyboard input in Google Chrome prior to 1040511279 can be recovered via the page cache attack and cache attack Use the profiler to profile your target applications This will create profiles based on the page activity of the processes on Windows and Linux Read the descriptions