Use-after-free vulnerability in the VisibleSelection::nonBoundaryShadowTreeRootNode function in core/editing/VisibleSelection.cpp in the DOM implementation in Blink, as used in Google Chrome before 40.0.2214.111 on Windows, OS X, and Linux and before 40.0.2214.109 on Android, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers improper handling of a shadow-root anchor.
The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/100715 | vdb entry |
http://www.securityfocus.com/bid/72497 | vdb entry |
http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html | |
http://secunia.com/advisories/62818 | third party advisory |
http://secunia.com/advisories/62925 | third party advisory |
http://googlechromereleases.blogspot.com/2015/02/chrome-for-android-update.html | |
http://security.gentoo.org/glsa/glsa-201502-13.xml | vendor advisory |
https://code.google.com/p/chromium/issues/detail?id=447906 | |
http://secunia.com/advisories/62917 | third party advisory |
https://src.chromium.org/viewvc/blink?revision=188788&view=revision | |
http://rhn.redhat.com/errata/RHSA-2015-0163.html | vendor advisory |
http://secunia.com/advisories/62670 | third party advisory |
http://www.securitytracker.com/id/1031709 | vdb entry |
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html | vendor advisory |
http://www.ubuntu.com/usn/USN-2495-1 | vendor advisory |