The NaClSandbox::InitializeLayerTwoSandbox function in components/nacl/loader/sandbox_linux/nacl_sandbox_linux.cc in Google Chrome before 42.0.2311.90 does not have RLIMIT_AS and RLIMIT_DATA limits for Native Client (aka NaCl) processes, which might make it easier for remote attackers to conduct row-hammer attacks or have unspecified other impact by leveraging the ability to run a crafted program in the NaCl sandbox.
References
Link | Resource |
---|---|
http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html | Release Notes Vendor Advisory |
http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html | Third Party Advisory |
http://www.securityfocus.com/bid/72715 | Third Party Advisory VDB Entry |
https://code.google.com/p/chromium/issues/detail?id=455839 | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2015-04-19 10:59
Updated : 2024-02-04 18:35
NVD link : CVE-2015-3335
Mitre link : CVE-2015-3335
CVE.ORG link : CVE-2015-3335
JSON object : View
Products Affected
opensuse
- opensuse
- chrome
CWE
CWE-264
Permissions, Privileges, and Access Controls