CVE-2017-5052

Priority
Description
An incorrect assumption about block structure in Blink in Google Chrome
prior to 57.0.2987.133 for Mac, Windows, and Linux, and 57.0.2987.132 for
Android, allowed a remote attacker to potentially exploit memory corruption
via a crafted HTML page that triggers improper casting.
Notes
Package
Upstream:released (57.0.2987.133)
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was ignored)
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was released [58.0.3029.81-0ubuntu0.14.04.1172])
Ubuntu 16.04 LTS (Xenial Xerus):released (58.0.3029.81-0ubuntu0.16.04.1277)
Ubuntu 18.04 LTS (Bionic Beaver):released (58.0.3029.81-0ubuntu2.1350)
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was ignored [Ubuntu touch end-of-life])
Ubuntu 16.04 LTS (Xenial Xerus):ignored (Ubuntu touch end-of-life)
Ubuntu 18.04 LTS (Bionic Beaver):DNE
More Information

Updated: 2020-01-29 19:59:14 UTC (commit 768ceb2fdee6790d707d0f681e1b54916744af1e)