CVE-2021-38023
Google Chrome vulnerability analysis and mitigation

Overview

Use after free vulnerability (CVE-2021-38023) was discovered in the Extensions component of Google Chrome prior to version 92.0.4515.107. The vulnerability allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page (NVD).

Technical details

The vulnerability is a heap-use-after-free issue in the task_manager component of Chrome's Extensions system. The issue occurs when TaskGroup::RefreshNaClDebugStubPort() reports its result synchronously instead of asynchronously with the ProcessHostOnUI feature enabled. This leads to a dangling pointer scenario where the TaskGroup object is deleted while still in use during TaskGroup::Refresh() (Chromium Issue).

Impact

This vulnerability has been rated as High severity with a CVSS v3.1 base score of 8.8. If successfully exploited, it could allow an attacker to execute arbitrary code within the context of the browser, potentially leading to heap corruption (NVD).

Mitigation and workarounds

The vulnerability was fixed in Chrome version 92.0.4515.107. Users should update their Chrome browser to this version or later. The fix involves modifying the TaskGroup::RefreshNaClDebugStubPort() to always report results asynchronously, eliminating the race condition that caused the use-after-free vulnerability (Chromium Issue).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management