Use after free in UI Foundations in Google Chrome on Chrome OS prior to 102.0.5005.61 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via specific user interactions.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "chromium-browser", "binary_version": "103.0.5060.134-0ubuntu0.18.04.1" }, { "binary_name": "chromium-browser-dbgsym", "binary_version": "103.0.5060.134-0ubuntu0.18.04.1" }, { "binary_name": "chromium-browser-l10n", "binary_version": "103.0.5060.134-0ubuntu0.18.04.1" }, { "binary_name": "chromium-chromedriver", "binary_version": "103.0.5060.134-0ubuntu0.18.04.1" }, { "binary_name": "chromium-chromedriver-dbgsym", "binary_version": "103.0.5060.134-0ubuntu0.18.04.1" }, { "binary_name": "chromium-codecs-ffmpeg", "binary_version": "103.0.5060.134-0ubuntu0.18.04.1" }, { "binary_name": "chromium-codecs-ffmpeg-dbgsym", "binary_version": "103.0.5060.134-0ubuntu0.18.04.1" }, { "binary_name": "chromium-codecs-ffmpeg-extra", "binary_version": "103.0.5060.134-0ubuntu0.18.04.1" }, { "binary_name": "chromium-codecs-ffmpeg-extra-dbgsym", "binary_version": "103.0.5060.134-0ubuntu0.18.04.1" } ] }