First published: Sun Apr 19 2015(Updated: )
The NaClSandbox::InitializeLayerTwoSandbox function in components/nacl/loader/sandbox_linux/nacl_sandbox_linux.cc in Google Chrome before 42.0.2311.90 does not have RLIMIT_AS and RLIMIT_DATA limits for Native Client (aka NaCl) processes, which might make it easier for remote attackers to conduct row-hammer attacks or have unspecified other impact by leveraging the ability to run a crafted program in the NaCl sandbox.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Google Chrome (Trace Event) | <=42.0.2311.60 | |
SUSE Linux | =13.1 | |
SUSE Linux | =13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-3335 has a medium severity rating due to its potential to allow remote attackers to exploit vulnerabilities in the Native Client sandboxing.
To fix CVE-2015-3335, update Google Chrome to version 42.0.2311.90 or later which contains the necessary security patches.
The impact of CVE-2015-3335 could potentially allow a remote attacker to manipulate the memory limits of Native Client processes.
Google Chrome versions prior to 42.0.2311.90 are affected by CVE-2015-3335.
CVE-2015-3335 affects Google Chrome on Linux distributions like SUSE Linux versions 13.1 and 13.2.