chromium is vulnerable to use-after free. The vulnerability exists in Feedback service on Chrome OS in Google Chrome which allows an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via specific UI interaction.