Vulnerability Description
Heap buffer overflow in Blink in Google Chrome prior to 101.0.4951.41 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Chrome | < 101.0.4951.41 |
Related Weaknesses (CWE)
References
- https://chromereleases.googleblog.com/2022/04/stable-channel-update-for-desktop_Release NotesVendor Advisory
- https://crbug.com/1306861ExploitIssue TrackingVendor Advisory
- https://lists.fedoraproject.org/archives/list/[email protected]
- https://lists.fedoraproject.org/archives/list/[email protected]
- https://chromereleases.googleblog.com/2022/04/stable-channel-update-for-desktop_Release NotesVendor Advisory
- https://crbug.com/1306861ExploitIssue TrackingVendor Advisory
- https://lists.fedoraproject.org/archives/list/[email protected]
- https://lists.fedoraproject.org/archives/list/[email protected]
FAQ
What is CVE-2022-4920?
CVE-2022-4920 is a vulnerability with a CVSS score of 9.6 (CRITICAL). Heap buffer overflow in Blink in Google Chrome prior to 101.0.4951.41 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially perform a sandbox escape via a cra...
How severe is CVE-2022-4920?
CVE-2022-4920 has been rated CRITICAL with a CVSS base score of 9.6/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2022-4920?
Check the references section above for vendor advisories and patch information. Affected products include: Google Chrome.