CVE-2014-1733

The PointerCompare function in codegen.cc in Seccomp-BPF, as used in Google Chrome before 34.0.1847.131 on Windows and OS X and before 34.0.1847.132 on Linux, does not properly merge blocks, which might allow remote attackers to bypass intended sandbox restrictions by leveraging renderer access.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
OR cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*

History

21 Nov 2024, 02:04

Type Values Removed Values Added
References () http://googlechromereleases.blogspot.com/2014/04/stable-channel-update_24.html - () http://googlechromereleases.blogspot.com/2014/04/stable-channel-update_24.html -
References () http://lists.opensuse.org/opensuse-updates/2014-05/msg00049.html - () http://lists.opensuse.org/opensuse-updates/2014-05/msg00049.html -
References () http://lists.opensuse.org/opensuse-updates/2014-05/msg00050.html - () http://lists.opensuse.org/opensuse-updates/2014-05/msg00050.html -
References () http://secunia.com/advisories/58301 - () http://secunia.com/advisories/58301 -
References () http://security.gentoo.org/glsa/glsa-201408-16.xml - () http://security.gentoo.org/glsa/glsa-201408-16.xml -
References () http://www.debian.org/security/2014/dsa-2920 - () http://www.debian.org/security/2014/dsa-2920 -
References () https://code.google.com/p/chromium/issues/detail?id=351103 - () https://code.google.com/p/chromium/issues/detail?id=351103 -
References () https://src.chromium.org/viewvc/chrome?revision=260157&view=revision - () https://src.chromium.org/viewvc/chrome?revision=260157&view=revision -

07 Nov 2023, 02:19

Type Values Removed Values Added
References (CONFIRM) https://src.chromium.org/viewvc/chrome?revision=260157&view=revision - Mailing List, Vendor Advisory () https://src.chromium.org/viewvc/chrome?revision=260157&view=revision -
References (SUSE) http://lists.opensuse.org/opensuse-updates/2014-05/msg00049.html - Broken Link () http://lists.opensuse.org/opensuse-updates/2014-05/msg00049.html -
References (SUSE) http://lists.opensuse.org/opensuse-updates/2014-05/msg00050.html - Broken Link () http://lists.opensuse.org/opensuse-updates/2014-05/msg00050.html -
References (SECUNIA) http://secunia.com/advisories/58301 - Broken Link, Vendor Advisory () http://secunia.com/advisories/58301 -
References (GENTOO) http://security.gentoo.org/glsa/glsa-201408-16.xml - Third Party Advisory () http://security.gentoo.org/glsa/glsa-201408-16.xml -
References (CONFIRM) http://googlechromereleases.blogspot.com/2014/04/stable-channel-update_24.html - Broken Link, Release Notes, Vendor Advisory () http://googlechromereleases.blogspot.com/2014/04/stable-channel-update_24.html -
References (DEBIAN) http://www.debian.org/security/2014/dsa-2920 - Third Party Advisory () http://www.debian.org/security/2014/dsa-2920 -
References (CONFIRM) https://code.google.com/p/chromium/issues/detail?id=351103 - Exploit, Issue Tracking, Mailing List, Vendor Advisory () https://code.google.com/p/chromium/issues/detail?id=351103 -

Information

Published : 2014-04-26 10:55

Updated : 2024-11-21 02:04


NVD link : CVE-2014-1733

Mitre link : CVE-2014-1733

CVE.ORG link : CVE-2014-1733


JSON object : View

Products Affected

google

  • chrome

microsoft

  • windows

linux

  • linux_kernel

apple

  • mac_os_x
CWE
CWE-20

Improper Input Validation