Impact
A use‑after‑free bug in Chrome’s Graphite rendering engine allows a remote attacker who has already compromised the renderer process to trigger a sandbox escape by loading a specially crafted HTML page. This flaw, represented by CWE‑416 and CWE‑825, carries a high severity rating and could permit execution of arbitrary code outside Chrome’s sandbox.
Affected Systems
All users operating Google Chrome on desktop via the stable channel with a build older than 147.0.7727.101 are affected. Versions released after that revision are not impacted, and other Chrome channels are not mentioned as vulnerable.
Risk and Exploitability
The CVSS score of 8.3 indicates significant impact, yet the exploit path requires prior compromises of the renderer process and currently no public exploits are known. The EPSS score is 0.022%, indicating a very low probability of exploitation, and the vulnerability is not listed in CISA’s KEV catalog, leaving practical risk moderate but the potential damage from a sandbox escape substantial. Timely patching remains recommended due to the high severity rating.
OpenCVE Enrichment
Debian DSA