Skip to main content

Use After Free in atom-shell

CVE-2022-1312

  • atom-shell
  • chromium
  • chromiumembeddedframework.runtime
  • electron
  • electron-nightly
  • electron-prebuilt
  • org.webjars.npm:electron
  • org.webjars.npm:electron-prebuilt
Severity High
Score 9.6/10

Summary

Use After Free in storage in Google Chrome prior to 100.0.4896.88 allowed an attacker who convinced a user to install a malicious extension to potentially perform a Sandbox Escape via a crafted Chrome Extension.

  • LOW
  • NETWORK
  • HIGH
  • CHANGED
  • REQUIRED
  • NONE
  • HIGH
  • HIGH

CWE-416 - Use After Free

Use-after-free (UaF) vulnerability occurs when the application is using a pointer to memory that has been freed. Any attempt to read/write to a buffer after it is de-allocated allows memory corruption, sensitive information exposure, and can potentially lead to arbitrary code execution.

Advisory Timeline

  • Published