8.8
CVSSv3

CVE-2022-3049

Published: 26/09/2022 Updated: 27/10/2022
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8

Vulnerability Summary

Use after free in SplitScreen in Google Chrome on Chrome OS, Lacros before 105.0.5195.52 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

google chrome

fedoraproject fedora 37

Vendor Advisories

LTS-102 has been updated in the LTS channel to 10205005182 (Platform Version: 146951350) for most ChromeOS devices Want to know more about Long-term Support? Click hereThis update contains multiple Security fixes, including:1340253  Critical CVE-2022-3038 Use after free in Network Service1051198  ...
Multiple security issues were discovered in Chromium, which could result in the execution of arbitrary code, denial of service or information disclosure For the stable distribution (bullseye), these problems have been fixed in version 1050519552-1~deb11u1 We recommend that you upgrade your chromium packages For the detailed security status of ...
The Chrome team is delighted to announce the promotion of Chrome 105 to the stable channel for Windows, Mac and Linux This will roll out over the coming days/weeksChrome 1050519552 ( Mac/linux) and 1050519552/53/54( Windows)  contains a number of fixes and improvements -- a list of changes is available in the log W ...

Github Repositories

CVE-2022-3049 Use after free in SplitScreen in Google Chrome on Chrome OS, Lacros prior to 1050519552 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page authentication complexity vector not available not available not available confidentiality integrity availability