First published: Wed Oct 08 2014(Updated: )
Use-after-free vulnerability in Blink, as used in Google Chrome before 38.0.2125.101, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers a widget-position update that improperly interacts with the render tree, related to the FrameView::updateLayoutAndStyleForPainting function in core/frame/FrameView.cpp and the RenderLayerScrollableArea::setScrollOffset function in core/rendering/RenderLayerScrollableArea.cpp.
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Chrome (Trace Event) | <=38.0.2125.7 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Server Supplementary | =6.0 | |
Red Hat Enterprise Linux Server Supplementary EUS | =6.6.z | |
Red Hat Enterprise Linux Workstation Supplementary | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3191 is classified as a medium severity vulnerability.
To fix CVE-2014-3191, update Google Chrome to version 38.0.2125.101 or later.
CVE-2014-3191 can lead to denial of service and other unspecified impacts through crafted JavaScript code.
All versions of Google Chrome before 38.0.2125.101 are affected by CVE-2014-3191.
CVE-2014-3191 primarily affects Google Chrome, but it may also impact Red Hat Enterprise Linux versions 6.0 and 6.6.z.