Use after free in PDF in Google Chrome prior to 105.0.5195.125 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)
References
Link | Resource |
---|---|
https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_14.html | Vendor Advisory |
https://crbug.com/1358090 | Permissions Required Vendor Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/ | Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/202209-23 | Third Party Advisory |
Configurations
History
21 Nov 2022, 19:54
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://security.gentoo.org/glsa/202209-23 - Third Party Advisory | |
References | (MISC) https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/ - Mailing List, Third Party Advisory |
10 Nov 2022, 00:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | Use after free in PDF in Google Chrome prior to 105.0.5195.125 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High) |
01 Nov 2022, 23:15
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/ - | |
References | (MISC) https://security.gentoo.org/glsa/202209-23 - |
27 Oct 2022, 19:53
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* |
cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:* |
First Time |
Fedoraproject
Fedoraproject fedora |
|
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/ - Mailing List, Third Party Advisory | |
References | (GENTOO) https://security.gentoo.org/glsa/202209-23 - Third Party Advisory |
03 Oct 2022, 02:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
29 Sep 2022, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
28 Sep 2022, 18:13
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:* |
|
References | (MISC) https://crbug.com/1358090 - Permissions Required, Vendor Advisory | |
References | (MISC) https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_14.html - Vendor Advisory | |
First Time |
Apple macos
Linux Linux linux Kernel Google chrome Apple |
|
CWE | CWE-416 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
26 Sep 2022, 16:24
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-09-26 16:15
Updated : 2023-12-10 14:35
NVD link : CVE-2022-3196
Mitre link : CVE-2022-3196
CVE.ORG link : CVE-2022-3196
JSON object : View
Products Affected
- chrome
fedoraproject
- fedora
CWE
CWE-416
Use After Free