CVE-2014-3165
Published: 13 August 2014
Use-after-free vulnerability in modules/websockets/WorkerThreadableWebSocketChannel.cpp in the Web Sockets implementation in Blink, as used in Google Chrome before 36.0.1985.143, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an unexpectedly long lifetime of a temporary object during method completion.
Priority
Status
Package | Release | Status |
---|---|---|
chromium-browser Launchpad, Ubuntu, Debian |
lucid |
Ignored
(end of life)
|
precise |
Released
(37.0.2062.94-0ubuntu0.12.04.1~pkg909)
|
|
trusty |
Released
(37.0.2062.94-0ubuntu0.14.04.1~pkg1042)
|
|
upstream |
Released
(36.0.1985.143)
|
|
oxide-qt Launchpad, Ubuntu, Debian |
lucid |
Does not exist
|
precise |
Does not exist
|
|
trusty |
Released
(1.0.5-0ubuntu0.14.04.1)
|
|
upstream |
Released
(1.0.5)
|
References
- https://src.chromium.org/viewvc/blink?revision=177359&view=revision
- https://code.google.com/p/chromium/issues/detail?id=390174
- http://googlechromereleases.blogspot.com/2014/08/stable-channel-update.html
- https://ubuntu.com/security/notices/USN-2320-1
- https://www.cve.org/CVERecord?id=CVE-2014-3165
- NVD
- Launchpad
- Debian