The sandbox implementation in Google Chrome before 7.0.517.41 on Linux does not properly constrain worker processes, which might allow remote attackers to bypass intended access restrictions via unspecified vectors.
References
Link | Resource |
---|---|
http://code.google.com/p/chromium/issues/detail?id=54794 | Issue Tracking Mailing List Patch Vendor Advisory |
http://secunia.com/advisories/41888 | Broken Link |
http://www.vupen.com/english/advisories/2010/2731 | Not Applicable |
http://googlechromereleases.blogspot.com/2010/10/stable-channel-update.html | Release Notes Vendor Advisory |
http://www.securityfocus.com/bid/44241 | Third Party Advisory VDB Entry |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14201 | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2010-10-21 12:00
Updated : 2020-07-31 12:33
NVD link : CVE-2010-4041
Mitre link : CVE-2010-4041
JSON object : View
CWE
Products Affected
- chrome
linux
- linux_kernel