Impact
An integer overflow in the Skia graphics library used by Google Chrome versions before 145.0.7632.159 permits a remote attacker to craft an HTML page that triggers out‑of‑bounds memory reads or writes. This flaw can lead to memory corruption, which might allow arbitrary code execution or cause a denial of service, though the description only indicates potential rather than confirmed exploitation. The weakness is characterized by CWE‑191 (Integer Overflow or Underflow) and CWE‑472 (Incorrect Calculation of Array Index).
Affected Systems
Google Chrome browsers on Windows, macOS, Linux, and Microsoft Windows that are installed at or before version 145.0.7632.159. The vulnerability affects all products that include the Skia library in these versions, as indicated by the vendor name Google and the relevant CPE strings for the Chrome browser.
Risk and Exploitability
The CVSS score of 8.8 classifies the flaw as high severity, while the EPSS score of <1% suggests low predicted exploitation probability at this time. The vulnerability is not currently listed in the CISA KEV catalog, indicating no confirmed exploits yet. The likely attack vector, based on the description, is a malicious HTML file or webpage that a user opens or visits. The description indicates that an attacker may manipulate Skia rendering to trigger out‑of‑bounds memory access, potentially leading to code execution or a crash, depending on the target environment.
OpenCVE Enrichment
Debian DSA