Bug 596478 - (CVE-2010-1419) CVE-2010-1419 WebKit: use-after-free vulnerability in handling of certain drag and drop operations
CVE-2010-1419 WebKit: use-after-free vulnerability in handling of certain dra...
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
All Linux
urgent Severity urgent
: ---
: ---
Assigned To: Red Hat Product Security
: Security
Depends On:
Blocks: 806808
  Show dependency treegraph
Reported: 2010-05-26 15:36 EDT by Vincent Danen
Modified: 2016-03-04 07:46 EST (History)
6 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2015-08-05 04:17:21 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description Vincent Danen 2010-05-26 15:36:17 EDT
A use after free issue exists in WebKit's handling of drag and drop when the window acting as a source of a drag operation is closed before the drag operation is completed. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved memory management.


Bugzilla: https://bugs.webkit.org/show_bug.cgi?id=37618
Trac: http://trac.webkit.org/changeset/58616


Red Hat would like to thank Drew Yao of Apple Product Security for responsibly reporting this issue. Upstream acknowledges kuzzcc, and Skylined of Google Chrome Security Team, as the original reporters.
Comment 2 Tomas Hoger 2010-05-28 07:28:19 EDT
Is this the same thing as?

[41469] Medium Memory error with drag + drop. Credit to kuzzcc. 

(chromium bug is not public at the moment)
Comment 3 Vincent Danen 2010-05-28 12:00:31 EDT
Yes, this is the same thing (upstream bug references this bug).
Comment 6 Jan Lieskovsky 2010-06-08 12:47:45 EDT
Public via:
  [1] http://support.apple.com/kb/HT419

Note You need to log in before you can comment on or make changes to this bug.