The sandbox implementation in Google Chrome before 7.0.517.41 on Linux does not properly constrain worker processes, which might allow remote attackers to bypass intended access restrictions via unspecified vectors.
References
| Link | Resource |
|---|---|
| http://code.google.com/p/chromium/issues/detail?id=54794 | Issue Tracking Mailing List Patch Vendor Advisory |
| http://secunia.com/advisories/41888 | Broken Link |
| http://www.vupen.com/english/advisories/2010/2731 | Not Applicable |
| http://googlechromereleases.blogspot.com/2010/10/stable-channel-update.html | Release Notes Vendor Advisory |
| http://www.securityfocus.com/bid/44241 | Third Party Advisory VDB Entry |
| https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14201 | Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
Information
Published : 2010-10-21 12:00
Updated : 2020-07-31 12:33
NVD link : CVE-2010-4041
Mitre link : CVE-2010-4041
JSON object : View
CWE
Products Affected
- chrome
linux
- linux_kernel


