First published: Thu Jan 22 2015(Updated: )
The SelectionOwner::ProcessTarget function in ui/base/x/selection_owner.cc in the UI implementation in Google Chrome before 40.0.2214.91 uses an incorrect data type for a certain length value, which allows remote attackers to cause a denial of service (out-of-bounds read) via crafted X11 data.
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Chromium | =40.0.2214.110 | |
redhat enterprise linux desktop supplementary | =6.0 | |
Red Hat Enterprise Linux Server Supplementary | =6.0 | |
Red Hat Enterprise Linux Server Supplementary EUS | =6.6.z | |
Red Hat Enterprise Linux Workstation Supplementary | =6.0 | |
Google Chrome | <=40.0.2214.85 | |
openSUSE | =13.1 | |
openSUSE | =13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-7941 has been assigned a severity rating of high due to its potential to cause a denial of service.
To fix CVE-2014-7941, update Google Chrome or the affected Red Hat Enterprise Linux packages to the latest version that addresses this vulnerability.
CVE-2014-7941 affects Google Chrome versions prior to 40.0.2214.91 and various Red Hat Enterprise Linux versions including 6.0.
CVE-2014-7941 facilitates a denial of service attack through out-of-bounds read issues when processing X11 data.
There is no specific workaround for CVE-2014-7941 other than applying the necessary security updates to mitigate the vulnerability.