First published: Mon Mar 09 2015(Updated: )
The RenderCounter::updateCounter function in core/rendering/RenderCounter.cpp in Blink, as used in Google Chrome before 41.0.2272.76, does not force a relayout operation and consequently does not initialize memory for a data structure, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted Cascading Style Sheets (CSS) token sequence.
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu | =14.04 | |
Ubuntu | =14.10 | |
Google Chrome (Trace Event) | <=40.0.2214.115 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Server Supplementary EUS | =6.6.z | |
Red Hat Enterprise Linux Workstation Supplementary | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1228 is classified as a denial of service vulnerability that can potentially impact system stability.
To mitigate CVE-2015-1228, update Google Chrome to the latest version or apply the appropriate security patches for the affected Linux distributions.
CVE-2015-1228 affects Google Chrome versions up to 40.0.2214.115.
CVE-2015-1228 impacts Ubuntu Linux versions 14.04 and 14.10, as well as Red Hat Enterprise Linux versions 6.0 and 6.6.z.
An attacker exploiting CVE-2015-1228 could cause a denial of service condition leading to application crashes.