Heap buffer overflow in WebRTC in Google Chrome prior to 103.0.5060.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
References
Link | Resource |
---|---|
https://crbug.com/1341043 | Permissions Required Vendor Advisory |
https://chromereleases.googleblog.com/2022/07/stable-channel-update-for-desktop.html | Release Notes Vendor Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5BQRTR4SIUNIHLLPWTGYSDNQK7DYCRSB/ | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2022/07/28/2 | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H2C4XOJVIILDXTOSMWJXHSQNEXFWSOD7/ | Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/202208-35 | Third Party Advisory |
https://security.gentoo.org/glsa/202208-39 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Information
Published : 2022-07-27 19:15
Updated : 2022-11-29 07:54
NVD link : CVE-2022-2294
Mitre link : CVE-2022-2294
JSON object : View
CWE
CWE-787
Out-of-bounds Write
Products Affected
fedoraproject
- extra_packages_for_enterprise_linux
- fedora
apple
- tvos
- macos
- mac_os_x
- watchos
- iphone_os
- ipados
webkitgtk
- webkitgtk
- chrome
webrtc_project
- webrtc
wpewebkit
- wpe_webkit