Bug 1165660 (CVE-2014-7909) - CVE-2014-7909 chromium-browser: Uninitialized memory read in Skia
Summary: CVE-2014-7909 chromium-browser: Uninitialized memory read in Skia
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2014-7909
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1165942 1165943
Blocks: 1165665 1167618
TreeView+ depends on / blocked
 
Reported: 2014-11-19 13:00 UTC by Vasyl Kaigorodov
Modified: 2021-02-17 05:59 UTC (History)
13 users (show)

Fixed In Version: Chrome 39.0.2171.65
Clone Of:
Environment:
Last Closed: 2015-09-04 06:36:37 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2014:1894 0 normal SHIPPED_LIVE Important: chromium-browser security update 2014-11-25 01:56:55 UTC

Description Vasyl Kaigorodov 2014-11-19 13:00:00 UTC
Unspecified vulnerability was found [1] in Skia (2D rendering engine used in Chromium) which leads to uninitialized memory read.

[1]: https://code.google.com/p/chromium/issues/detail?id=391001

External References:

http://googlechromereleases.blogspot.com/2014/11/stable-channel-update_18.html

Comment 2 Huzaifa S. Sidhpurwala 2014-11-20 05:41:32 UTC
Upstream patch:

https://skia.googlesource.com/skia/+/1c577cd3ee331944b9061ee0eec147b211ee563c

Comment 3 errata-xmlrpc 2014-11-24 20:57:31 UTC
This issue has been addressed in the following products:

  Supplementary for Red Hat Enterprise Linux 6

Via RHSA-2014:1894 https://rhn.redhat.com/errata/RHSA-2014-1894.html

Comment 4 Huzaifa S. Sidhpurwala 2015-09-04 06:36:37 UTC
Analysis:

On further investigation, it was found that this issue does not affect librsvg2. It only affects the skia library.

Statement:

This issue did not affect the versions of librsvg2 as shipped with Red Hat Enterprise Linux 5, 6 and 7.


Note You need to log in before you can comment on or make changes to this bug.