logo
DATABASE RESOURCES PRICING ABOUT US

Use-After-Free

Description

chromium is vulnerable to use-after-free. The vulnerability exists in chrome OS shell component of the chromium browser which allows an attacker to convince a user to enable a specific enterprise policy to potentially exploit heap corruption via a malicious HTML page.


Affected Software


CPE Name Name Version
chromium:sid 88.0.4324.182-1
chromium:sid 83.0.4103.116-3.1
chromium:bullseye 83.0.4103.116-3.1
chromium-browser:bionic 85.0.4183.83-0ubuntu0.18.04.2
chromium-browser:bionic 84.0.4147.105-0ubuntu0.18.04.1
chromium-browser:bionic 65.0.3325.181-0ubuntu1
chromium-browser:bionic 86.0.4240.198-0ubuntu0.18.04.1
chromium-browser:bionic 92.0.4515.159-0ubuntu0.18.04.1
chromium:sid 88.0.4324.182-1
chromium:sid 83.0.4103.116-3.1
chromium:bullseye 83.0.4103.116-3.1
chromium-browser:bionic 85.0.4183.83-0ubuntu0.18.04.2
chromium-browser:bionic 84.0.4147.105-0ubuntu0.18.04.1
chromium-browser:bionic 65.0.3325.181-0ubuntu1
chromium-browser:bionic 86.0.4240.198-0ubuntu0.18.04.1
chromium-browser:bionic 92.0.4515.159-0ubuntu0.18.04.1

Related