First published: Sat Apr 26 2014(Updated: )
The PointerCompare function in codegen.cc in Seccomp-BPF, as used in Google Chrome before 34.0.1847.131 on Windows and OS X and before 34.0.1847.132 on Linux, does not properly merge blocks, which might allow remote attackers to bypass intended sandbox restrictions by leveraging renderer access.
Credit: cve-coordination@google.com chrome-cve-admin@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Chrome | <34.0.1847.131 | |
Apple iOS and macOS | ||
Microsoft Windows Operating System | ||
Google Chrome | <34.0.1847.132 | |
Linux Kernel | ||
All of | ||
Google Chrome | <34.0.1847.131 | |
Any of | ||
Apple iOS and macOS | ||
Microsoft Windows Operating System | ||
All of | ||
Google Chrome | <34.0.1847.132 | |
Linux Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1733 has a moderate severity rating, indicating it could allow attackers to bypass sandbox restrictions.
CVE-2014-1733 may allow remote attackers to execute unauthorized actions within a privileged context.
To fix CVE-2014-1733, users should update Google Chrome to version 34.0.1847.132 or later.
CVE-2014-1733 affects Google Chrome versions prior to 34.0.1847.132.
CVE-2014-1733 primarily affects Google Chrome on Windows and OS X, as well as Linux before specific updates.