Input validation error in Debian Linux - CVE-2015-1245
Published: April 19, 2015 / Updated: August 9, 2020
Debian Linux
Detailed vulnerability description
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Use-after-free vulnerability in the OpenPDFInReaderView::Update function in browser/ui/views/location_bar/open_pdf_in_reader_view.cc in Google Chrome before 41.0.2272.76 might allow user-assisted remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact by triggering interaction with a PDFium "Open PDF in Reader" button that has an invalid tab association. <a href="http://cwe.mitre.org/data/definitions/416.html">CWE-416: Use After Free</a>
How to mitigate CVE-2015-1245
Sources
- http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html
- http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html
- http://lists.opensuse.org/opensuse-updates/2015-11/msg00024.html
- http://rhn.redhat.com/errata/RHSA-2015-0816.html
- http://www.debian.org/security/2015/dsa-3238
- http://www.securitytracker.com/id/1032209
- https://code.google.com/p/chromium/issues/detail?id=444957
- https://codereview.chromium.org/831283002
- https://security.gentoo.org/glsa/201506-04