logo
DATABASE RESOURCES PRICING ABOUT US

Use After Free

Description

chromium is vulnerable to use after free. An attacker can convince a user to enable a specific enterprise policy to potentially exploit heap corruption via a crafted HTML page.


Affected Software


CPE Name Name Version
chromium:sid 88.0.4324.182-1
chromium:sid 83.0.4103.116-3.1
chromium:bullseye 83.0.4103.116-3.1
chromium-browser:bionic 86.0.4240.198-0ubuntu0.18.04.1
chromium-browser:bionic 84.0.4147.105-0ubuntu0.18.04.1
chromium-browser:bionic 92.0.4515.159-0ubuntu0.18.04.1
chromium-browser:bionic 65.0.3325.181-0ubuntu1
chromium-browser:bionic 85.0.4183.83-0ubuntu0.18.04.2
chromium:sid 88.0.4324.182-1
chromium:sid 83.0.4103.116-3.1
chromium:bullseye 83.0.4103.116-3.1
chromium-browser:bionic 86.0.4240.198-0ubuntu0.18.04.1
chromium-browser:bionic 84.0.4147.105-0ubuntu0.18.04.1
chromium-browser:bionic 92.0.4515.159-0ubuntu0.18.04.1
chromium-browser:bionic 65.0.3325.181-0ubuntu1
chromium-browser:bionic 85.0.4183.83-0ubuntu0.18.04.2

Related