Use after free in PDF in Google Chrome prior to 105.0.5195.125 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)
References
| Link | Resource |
|---|---|
| https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_14.html | Vendor Advisory |
| https://crbug.com/1358090 | Permissions Required Vendor Advisory |
| https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/ | Mailing List Third Party Advisory |
| https://security.gentoo.org/glsa/202209-23 | Third Party Advisory |
| https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_14.html | Vendor Advisory |
| https://crbug.com/1358090 | Permissions Required Vendor Advisory |
| https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/ | Mailing List Third Party Advisory |
| https://security.gentoo.org/glsa/202209-23 | Third Party Advisory |
| https://issues.chromium.org/issues/40060720 |
Configurations
History
21 May 2025, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Information
Published : 2022-09-26 16:15
Updated : 2025-05-21 21:15
NVD link : CVE-2022-3196
Mitre link : CVE-2022-3196
CVE.ORG link : CVE-2022-3196
JSON object : View
Products Affected
- chrome
fedoraproject
- fedora
CWE
CWE-416
Use After Free
