Impact
An integer overflow occurs in Chrome’s ANGLE rendering subsystem, which is used for WebGL and other graphics operations. The flaw can be triggered by a specially crafted HTML page loaded in the browser, allowing a remote attacker to cause an out-of-bounds memory read or write. This memory corruption could potentially expose or alter data located outside the intended buffer, depending on how the overflow is leveraged. While the description does not explicitly state that arbitrary code can be executed, memory corruption is a prerequisite for many exploitation scenarios.
Affected Systems
Google Chrome versions prior to 145.0.7632.159 are affected on all major operating systems, including Windows, macOS, and Linux. The issue is specific to Chrome itself and does not affect the underlying operating systems directly.
Risk and Exploitability
The CVSS score of 8.8 marks this flaw as high severity. The EPSS score of less than 1 % indicates a very low current probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. Still, the remote attack vector—exploiting a malicious or compromised web page—means that any user who visits an attacker‑controlled site could be exposed. The risk is significant enough to warrant prompt remediation, especially in environments where the ability to mitigate exposure is limited.
OpenCVE Enrichment
Debian DSA