The PointerCompare function in codegen.cc in Seccomp-BPF, as used in Google Chrome before 34.0.1847.131 on Windows and OS X and before 34.0.1847.132 on Linux, does not properly merge blocks, which might allow remote attackers to bypass intended sandbox restrictions by leveraging renderer access.
References
Configurations
History
07 Nov 2023, 02:19
Type | Values Removed | Values Added |
---|---|---|
References | () https://src.chromium.org/viewvc/chrome?revision=260157&view=revision - | |
References | () http://lists.opensuse.org/opensuse-updates/2014-05/msg00049.html - | |
References | () http://lists.opensuse.org/opensuse-updates/2014-05/msg00050.html - | |
References | () http://secunia.com/advisories/58301 - | |
References | () http://security.gentoo.org/glsa/glsa-201408-16.xml - | |
References | () http://googlechromereleases.blogspot.com/2014/04/stable-channel-update_24.html - | |
References | () http://www.debian.org/security/2014/dsa-2920 - | |
References | () https://code.google.com/p/chromium/issues/detail?id=351103 - |
Information
Published : 2014-04-26 10:55
Updated : 2024-02-28 12:20
NVD link : CVE-2014-1733
Mitre link : CVE-2014-1733
CVE.ORG link : CVE-2014-1733
JSON object : View
Products Affected
linux
- linux_kernel
- chrome
microsoft
- windows
apple
- mac_os_x
CWE
CWE-20
Improper Input Validation