{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-2313","assignerOrgId":"ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28","state":"PUBLISHED","assignerShortName":"Chrome","dateReserved":"2023-04-26T18:49:35.527Z","datePublished":"2023-07-28T23:26:54.882Z","dateUpdated":"2025-02-13T16:44:08.292Z"},"containers":{"cna":{"affected":[{"vendor":"Google","product":"Chrome","versions":[{"version":"112.0.5615.49","status":"affected","lessThan":"112.0.5615.49","versionType":"custom"}]}],"descriptions":[{"lang":"en","value":"Inappropriate implementation in Sandbox in Google Chrome on Windows prior to 112.0.5615.49 allowed a remote attacker who had compromised the renderer process to perform arbitrary read/write via a malicious file. (Chromium security severity: High)"}],"problemTypes":[{"descriptions":[{"lang":"en","description":"Inappropriate implementation"}]}],"providerMetadata":{"orgId":"ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28","shortName":"Chrome","dateUpdated":"2023-08-10T02:06:36.663Z"},"references":[{"url":"https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html"},{"url":"https://crbug.com/1335974"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B6SAST6CB5KKCQKH75ER2UQ3ICYPHCIZ/"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2LE64KGGOISKPKMYROSDT4K6QFVDIRF6/"}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T06:19:14.954Z"},"title":"CVE Program Container","references":[{"url":"https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html","tags":["x_transferred"]},{"url":"https://crbug.com/1335974","tags":["x_transferred"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B6SAST6CB5KKCQKH75ER2UQ3ICYPHCIZ/","tags":["x_transferred"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2LE64KGGOISKPKMYROSDT4K6QFVDIRF6/","tags":["x_transferred"]}]}]}}