First published: Fri Feb 06 2015(Updated: )
Use-after-free vulnerability in the VisibleSelection::nonBoundaryShadowTreeRootNode function in core/editing/VisibleSelection.cpp in the DOM implementation in Blink, as used in Google Chrome before 40.0.2214.111 on Windows, OS X, and Linux and before 40.0.2214.109 on Android, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers improper handling of a shadow-root anchor.
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Chrome | <40.0.2214.109 | |
Google Chrome | <40.0.2214.111 | |
Apple macOS | ||
Linux Kernel | ||
Microsoft Windows | ||
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =14.10 | |
redhat enterprise Linux desktop | =6.0 | |
redhat enterprise Linux eus | =6.6 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux server aus | =6.6 | |
redhat enterprise Linux workstation | =6.0 | |
openSUSE | =13.1 | |
openSUSE | =13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1209 is classified as a high-severity vulnerability due to its potential for exploitation by remote attackers.
To mitigate CVE-2015-1209, users should update their Google Chrome browser to the latest version beyond 40.0.2214.111.
CVE-2015-1209 affects Google Chrome versions prior to 40.0.2214.111 on Windows, OS X, and Linux, and prior to 40.0.2214.109 on Android.
Exploitation of CVE-2015-1209 could allow an attacker to execute arbitrary code and gain control over an affected system.
No, the Linux kernel itself is not vulnerable to CVE-2015-1209, as the vulnerability is specific to the Blink engine in Google Chrome.