Description
Out of bounds read in ANGLE in Google Chrome prior to 111.0.5563.110 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
References (8)
Core 8
Core References
Third Party Advisory, VDB Entry
http://packetstormsecurity.com/files/171961/Chrome-GL_ShaderBinary-Untrusted-Process-Exposure.html
Third Party Advisory, VDB Entry
http://packetstormsecurity.com/files/171965/Chrome-SpvGetMappedSamplerName-Out-Of-Bounds-String-Copy.html
Release Notes, Vendor Advisory
https://chromereleases.googleblog.com/2023/03/stable-channel-update-for-desktop_21.html
Permissions Required
https://crbug.com/1422594
Mailing List
https://lists.fedoraproject.org/archives/list/[email protected]/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/
Mailing List
https://lists.fedoraproject.org/archives/list/[email protected]/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/
Mailing List
https://lists.fedoraproject.org/archives/list/[email protected]/message/NGWWGQULJ7QRNP4GY57HE7OO7VMRWMPN/
Third Party Advisory
https://security.gentoo.org/glsa/202309-17
Scores
CVSS v3
8.8
EPSS
0.0040
EPSS Percentile
60.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-125
Status
published
Products (4)
fedoraproject/fedora
36
fedoraproject/fedora
37
fedoraproject/fedora
38
google/chrome
< 111.0.5563.110
Published
Mar 21, 2023
Tracked Since
Feb 18, 2026