~ubuntu-security/ubuntu-cve-tracker/master

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
Candidate: CVE-2014-3196
PublicDate: 2014-10-08
References:
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3196
 https://src.chromium.org/viewvc/chrome?revision=288152&view=revision
 https://src.chromium.org/viewvc/chrome?revision=285195&view=revision
 https://crbug.com/338538
 http://googlechromereleases.blogspot.com/2014/10/stable-channel-update.html
Description:
 base/memory/shared_memory_win.cc in Google Chrome before 38.0.2125.101 on
 Windows does not properly implement read-only restrictions on shared
 memory, which allows attackers to bypass a sandbox protection mechanism via
 unspecified vectors.
Ubuntu-Description:
Notes:
 sarnold> Windows sandbox bypass
Bugs:
Priority: medium
Discovered-by: James Forshaw
Assigned-to:

Patches_chromium-browser:
upstream_chromium-browser: released (38.0.2125.101)
lucid_chromium-browser: ignored (reached end-of-life)
precise_chromium-browser: not-affected
trusty_chromium-browser: not-affected
devel_chromium-browser: not-affected

Patches_oxide-qt:
upstream_oxide-qt: not-affected
lucid_oxide-qt: DNE
precise_oxide-qt: DNE
trusty_oxide-qt: not-affected
devel_oxide-qt: not-affected