CVE-2022-4177
Gentoo Linux Security Advisory 202311-11
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Use after free in Extensions in Google Chrome prior to 108.0.5359.71 allowed an attacker who convinced a user to install an extension to potentially exploit heap corruption via a crafted Chrome Extension and UI interaction. (Chromium security severity: High)
El Use after free en Extensiones de Google Chrome anteriores a 108.0.5359.71 permitió que un atacante convenciera a un usuario de instalar una extensión para explotar potencialmente la corrupción del montón a través de una extensión de Chrome manipulada y una interacción de interfaz de usuario. (Severidad de seguridad de Chromium: alta)
Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution. Versions greater than or equal to 5.15.10_p20230623 are affected.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-11-29 CVE Reserved
- 2022-11-29 CVE Published
- 2024-08-03 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-416: Use After Free
CAPEC
References (3)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://chromereleases.googleblog.com/2022/11/stable-channel-update-for-desktop_29.html | 2023-11-25 | |
https://security.gentoo.org/glsa/202305-10 | 2023-11-25 | |
https://security.gentoo.org/glsa/202311-11 | 2023-11-25 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Google Search vendor "Google" | Chrome Search vendor "Google" for product "Chrome" | < 108.0.5359.71 Search vendor "Google" for product "Chrome" and version " < 108.0.5359.71" | - |
Affected
|