Race condition in the ResourceDispatcherHostImpl::BeginRequest function in content/browser/loader/resource_dispatcher_host_impl.cc in Google Chrome before 50.0.2661.102 allows remote attackers to make arbitrary HTTP requests by leveraging access to a renderer process and reusing a request ID.
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/90584 | vdb entry |
http://www.securitytracker.com/id/1035872 | vdb entry |
http://rhn.redhat.com/errata/RHSA-2016-1080.html | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00043.html | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html | vendor advisory |
http://www.debian.org/security/2016/dsa-3590 | vendor advisory |
http://www.ubuntu.com/usn/USN-2960-1 | vendor advisory |
https://crbug.com/578882 | |
http://googlechromereleases.blogspot.com/2016/05/stable-channel-update.html | |
https://codereview.chromium.org/1608573002 | |
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00050.html | vendor advisory |
https://security.gentoo.org/glsa/201605-02 | vendor advisory |