Impact
A use‑after‑free condition in Chrome’s video subsystem allows a remote attacker to trigger arbitrary code execution inside the browser’s sandbox. The flaw is triggered by loading a specially crafted HTML page and can allow execution of native code within the sandbox. It is a classic CWE‑416 scenario where memory that has been freed is accessed again.
Affected Systems
Google Chrome versions prior to 147.0.7727.101 are affected. The vulnerability is present in the standard stable channel of the desktop release and likely applies to all variants that contain the same video engine code.
Risk and Exploitability
The CVE has a CVSS score of 8.8, indicating high severity, and while EPSS data is not available, the lack of a public KEV listing suggests the vulnerability is not currently in widespread use. The attack requires a remote adversary to entice a user to visit a malicious HTML page, after which the use‑after‑free can be triggered. If successful, the attacker can execute arbitrary code within the sandbox. Based on the description, it is inferred that the likely attack vector is remote via a crafted web page; knowledge of the specific memory layout is not required due to the vulnerability in the browser code.
OpenCVE Enrichment
Debian DSA