The sandbox implementation in Google Chrome before 7.0.517.41 on Linux does not properly constrain worker processes, which might allow remote attackers to bypass intended access restrictions via unspecified vectors.
Link | Tags |
---|---|
http://www.vupen.com/english/advisories/2010/2731 | vdb entry not applicable |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14201 | signature third party advisory vdb entry |
http://code.google.com/p/chromium/issues/detail?id=54794 | patch mailing list vendor advisory issue tracking |
http://secunia.com/advisories/41888 | third party advisory broken link |
http://www.securityfocus.com/bid/44241 | third party advisory vdb entry |
http://googlechromereleases.blogspot.com/2010/10/stable-channel-update.html | release notes vendor advisory |