Impact
A use‑after‑free vulnerability in the Dawn graphics engine of Google Chrome allows an attacker who has already compromised the renderer process to free an object and subsequently use it after deallocation. This flaw can lead to a sandbox escape, enabling the attacker to execute code with the privileges of the browser process. The weakness is classified as CWE‑416 (Use After Free) and CWE‑825 (Resource Management Error).
Affected Systems
All desktop installations of Google Chrome up to and including version 147.0.7727.100 that use the Dawn rendering backend are affected. The issue is resolved in 147.0.7727.101 and later releases. No other platforms or product variants are listed as impacted.
Risk and Exploitability
Chromium rates the vulnerability with a CVSS score of 8.3, indicating high severity, while the EPSS score is reported as below 1 %, suggesting a low likelihood of exploitation; the flaw is not listed in the CISA KEV catalog. The likely attack vector is a malicious web page that causes the renderer to be compromised; based on the description, it is inferred that an attacker first must gain control of the renderer process, for example via malicious content, before triggering the use‑after‑free to escape the sandbox. The prerequisite reduces overall exploitation likelihood, but a successful execution would give the attacker significant system privileges.
OpenCVE Enrichment
Debian DSA