Upstream information
Description
Use-after-free vulnerability in core/xml/XMLHttpRequest.cpp in Blink, as used in Google Chrome before 30.0.1599.101, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger multiple conflicting uses of the same XMLHttpRequest object.SUSE information
Overall state of this security issue: Resolved
This issue is currently rated as having important severity.
| CVSS detail | National Vulnerability Database | 
|---|---|
| Base Score | 6.8 | 
| Vector | AV:N/AC:M/Au:N/C:P/I:P/A:P | 
| Access Vector | Network | 
| Access Complexity | Medium | 
| Authentication | None | 
| Confidentiality Impact | Partial | 
| Integrity Impact | Partial | 
| Availability Impact | Partial | 
SUSE Security Advisories:
- openSUSE-SU-2013:1729-1
- openSUSE-SU-2013:1776-1, published Fri Dec 8 15:48:58 2023
- openSUSE-SU-2013:1861-1, published Fri Dec 8 15:48:32 2023 openSUSE-SU-2014:0065-1
List of released packages
| Product(s) | Fixed package version(s) | References | 
|---|---|---|
| openSUSE Leap 15.0 | 
 | Patchnames: openSUSE Leap 15.0 GA chromium-66.0.3359.170-lp150.1.1 | 
| openSUSE Tumbleweed | 
 | Patchnames: openSUSE-Tumbleweed-2024-10171 openSUSE-Tumbleweed-2024-12948 | 
SUSE Timeline for this CVE
CVE page created: Thu Mar 8 11:25:03 2012CVE page last modified: Mon Oct 6 18:19:13 2025
