Use after free in PDF in Google Chrome prior to 105.0.5195.125 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)
References
Link | Resource |
---|---|
https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_14.html | Vendor Advisory |
https://crbug.com/1358090 | Permissions Required Vendor Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/ | Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/202209-23 | Third Party Advisory |
https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_14.html | Vendor Advisory |
https://crbug.com/1358090 | Permissions Required Vendor Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/ | Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/202209-23 | Third Party Advisory |
Configurations
History
21 Nov 2024, 07:19
Type | Values Removed | Values Added |
---|---|---|
References | () https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_14.html - Vendor Advisory | |
References | () https://crbug.com/1358090 - Permissions Required, Vendor Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/ - Mailing List, Third Party Advisory | |
References | () https://security.gentoo.org/glsa/202209-23 - Third Party Advisory |
Information
Published : 2022-09-26 16:15
Updated : 2024-11-21 07:19
NVD link : CVE-2022-3196
Mitre link : CVE-2022-3196
CVE.ORG link : CVE-2022-3196
JSON object : View
Products Affected
fedoraproject
- fedora
- chrome
CWE
CWE-416
Use After Free