
Cloud Vulnerability DB
A community-led vulnerabilities database
A high-severity use-after-free vulnerability in Google Chrome's Layout component was identified as CVE-2022-3654. The vulnerability affected versions of Google Chrome prior to 107.0.5304.62 and was discovered on August 19, 2022, by Sergei Glazunov of Google Project Zero. This security flaw allowed remote attackers to potentially exploit heap corruption through specially crafted HTML pages (Chrome Release).
The vulnerability is classified as a use-after-free bug specifically affecting the Layout component in Google Chrome's blink engine. The issue was discovered in the LocalFrameView PerformLayout functionality. This type of vulnerability occurs when the program continues to use a memory location after it has been freed, which can lead to program crashes or potential code execution (Debian Security).
The vulnerability could allow remote attackers to exploit heap corruption through specially crafted HTML pages, potentially leading to arbitrary code execution. Given its high-severity rating from the Chromium security team, this vulnerability represented a significant security risk to users of affected Chrome versions (Chrome Release).
Google addressed this vulnerability in Chrome version 107.0.5304.62 for Windows and Mac, and 107.0.5304.68 for Linux. Users were advised to update their Chrome browsers to these versions or later to protect against potential exploits. The fix was also incorporated into various Linux distributions, including Debian's security updates (Debian Security, Chrome Release).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."