First published: Mon Mar 09 2015(Updated: )
Integer overflow in the SkAutoSTArray implementation in include/core/SkTemplates.h in the filters implementation in Skia, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a reset action with a large count value, leading to an out-of-bounds write operation.
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Server Supplementary | =6.0 | |
Red Hat Enterprise Linux Server Supplementary EUS | =6.6.z | |
Red Hat Enterprise Linux Workstation Supplementary | =6.0 | |
Ubuntu | =14.04 | |
Ubuntu | =14.10 | |
Google Chrome (Trace Event) | <=40.0.2214.115 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1214 has been classified as a high severity vulnerability due to its potential to cause denial of service.
To fix CVE-2015-1214, users should update their Google Chrome to version 41.0.2272.76 or later.
CVE-2015-1214 affects Google Chrome versions prior to 41.0.2272.76 and several versions of Red Hat and Ubuntu operating systems.
Yes, CVE-2015-1214 can be exploited remotely, making it a significant risk for users who do not apply the necessary updates.
CVE-2015-1214 is associated with denial of service attacks that may occur due to integer overflow vulnerabilities.