Use-after-free vulnerability in Google Chrome before 26.0.1410.43 on Linux allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging the presence of an extension that creates a pop-up window.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Chrome | * | 26.0.1410.42 | |
Chrome | 26.0.1410.0 | 26.0.1410.0 | |
Chrome | 26.0.1410.1 | 26.0.1410.1 | |
Chrome | 26.0.1410.2 | 26.0.1410.2 | |
Chrome | 26.0.1410.3 | 26.0.1410.3 | |
Chrome | 26.0.1410.4 | 26.0.1410.4 | |
Chrome | 26.0.1410.5 | 26.0.1410.5 | |
Chrome | 26.0.1410.6 | 26.0.1410.6 | |
Chrome | 26.0.1410.7 | 26.0.1410.7 | |
Chrome | 26.0.1410.8 | 26.0.1410.8 | |
Chrome | 26.0.1410.9 | 26.0.1410.9 | |
Chrome | 26.0.1410.10 | 26.0.1410.10 | |
Chrome | 26.0.1410.11 | 26.0.1410.11 | |
Chrome | 26.0.1410.12 | 26.0.1410.12 | |
Chrome | 26.0.1410.14 | 26.0.1410.14 | |
Chrome | 26.0.1410.15 | 26.0.1410.15 | |
Chrome | 26.0.1410.16 | 26.0.1410.16 | |
Chrome | 26.0.1410.17 | 26.0.1410.17 | |
Chrome | 26.0.1410.18 | 26.0.1410.18 | |
Chrome | 26.0.1410.19 | 26.0.1410.19 | |
Chrome | 26.0.1410.20 | 26.0.1410.20 | |
Chrome | 26.0.1410.21 | 26.0.1410.21 | |
Chrome | 26.0.1410.22 | 26.0.1410.22 | |
Chrome | 26.0.1410.23 | 26.0.1410.23 | |
Chrome | 26.0.1410.24 | 26.0.1410.24 | |
Chrome | 26.0.1410.25 | 26.0.1410.25 | |
Chrome | 26.0.1410.26 | 26.0.1410.26 | |
Chrome | 26.0.1410.27 | 26.0.1410.27 | |
Chrome | 26.0.1410.28 | 26.0.1410.28 | |
Chrome | 26.0.1410.29 | 26.0.1410.29 | |
Chrome | 26.0.1410.30 | 26.0.1410.30 | |
Chrome | 26.0.1410.31 | 26.0.1410.31 | |
Chrome | 26.0.1410.32 | 26.0.1410.32 | |
Chrome | 26.0.1410.33 | 26.0.1410.33 | |
Chrome | 26.0.1410.34 | 26.0.1410.34 | |
Chrome | 26.0.1410.35 | 26.0.1410.35 | |
Chrome | 26.0.1410.36 | 26.0.1410.36 | |
Chrome | 26.0.1410.37 | 26.0.1410.37 | |
Chrome | 26.0.1410.38 | 26.0.1410.38 | |
Chrome | 26.0.1410.39 | 26.0.1410.39 | |
Chrome | 26.0.1410.40 | 26.0.1410.40 | |
Chrome | 26.0.1410.41 | 26.0.1410.41 |