Use after free in Sign-In Flow in Google Chrome prior to 105.0.5195.52 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via crafted UI interaction.
{
"binaries": [
{
"binary_version": "105.0.5195.102-0ubuntu0.18.04.1",
"binary_name": "chromium-browser"
},
{
"binary_version": "105.0.5195.102-0ubuntu0.18.04.1",
"binary_name": "chromium-browser-l10n"
},
{
"binary_version": "105.0.5195.102-0ubuntu0.18.04.1",
"binary_name": "chromium-chromedriver"
},
{
"binary_version": "105.0.5195.102-0ubuntu0.18.04.1",
"binary_name": "chromium-codecs-ffmpeg"
},
{
"binary_version": "105.0.5195.102-0ubuntu0.18.04.1",
"binary_name": "chromium-codecs-ffmpeg-extra"
}
],
"availability": "No subscription required"
}