The PointerCompare function in codegen.cc in Seccomp-BPF, as used in Google Chrome before 34.0.1847.131 on Windows and OS X and before 34.0.1847.132 on Linux, does not properly merge blocks, which might allow remote attackers to bypass intended sandbox restrictions by leveraging renderer access.
References
Link | Resource |
---|---|
http://googlechromereleases.blogspot.com/2014/04/stable-channel-update_24.html | Broken Link Release Notes Vendor Advisory |
https://code.google.com/p/chromium/issues/detail?id=351103 | Exploit Issue Tracking Mailing List Vendor Advisory |
https://src.chromium.org/viewvc/chrome?revision=260157&view=revision | Mailing List Vendor Advisory |
http://secunia.com/advisories/58301 | Broken Link Vendor Advisory |
http://www.debian.org/security/2014/dsa-2920 | Third Party Advisory |
http://lists.opensuse.org/opensuse-updates/2014-05/msg00050.html | Broken Link |
http://lists.opensuse.org/opensuse-updates/2014-05/msg00049.html | Broken Link |
http://security.gentoo.org/glsa/glsa-201408-16.xml | Third Party Advisory |
Information
Published : 2014-04-26 03:55
Updated : 2022-11-10 11:43
NVD link : CVE-2014-1733
Mitre link : CVE-2014-1733
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
apple
- mac_os_x
linux
- linux_kernel
- chrome
microsoft
- windows