CVE-2012-5153
Published: 15 January 2013
Google V8 before 3.14.5.3, as used in Google Chrome before 24.0.1312.52, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers an out-of-bounds access to stack memory.
Notes
Author | Note |
---|---|
mikesalvatore | The Ubuntu Security Team does not support libv8 |
Priority
Status
Package | Release | Status |
---|---|---|
libv8-3.14 Launchpad, Ubuntu, Debian |
lucid |
Does not exist
|
artful |
Ignored
(end of life)
|
|
bionic |
Ignored
(libv8 not supported)
|
|
cosmic |
Ignored
(end of life)
|
|
precise |
Does not exist
|
|
quantal |
Does not exist
|
|
raring |
Does not exist
|
|
saucy |
Ignored
(end of life)
|
|
trusty |
Does not exist
(trusty was ignored [libv8 not supported])
|
|
upstream |
Needed
|
|
utopic |
Ignored
(end of life)
|
|
vivid |
Ignored
(end of life)
|
|
wily |
Ignored
(end of life)
|
|
xenial |
Ignored
(libv8 not supported)
|
|
yakkety |
Ignored
(end of life)
|
|
zesty |
Ignored
(end of life)
|
|
chromium-browser Launchpad, Ubuntu, Debian |
artful |
Released
(24.0.1312.56-0ubuntu1)
|
bionic |
Released
(24.0.1312.56-0ubuntu1)
|
|
cosmic |
Released
(24.0.1312.56-0ubuntu1)
|
|
hardy |
Does not exist
|
|
lucid |
Released
(24.0.1312.56-0ubuntu0.10.04.1)
|
|
oneiric |
Released
(24.0.1312.56-0ubuntu0.11.10.1)
|
|
precise |
Released
(24.0.1312.56-0ubuntu0.12.04.1)
|
|
quantal |
Released
(24.0.1312.56-0ubuntu0.12.10.3)
|
|
raring |
Released
(24.0.1312.56-0ubuntu1)
|
|
saucy |
Released
(24.0.1312.56-0ubuntu1)
|
|
trusty |
Released
(24.0.1312.56-0ubuntu1)
|
|
upstream |
Released
(24.0.1312.52)
|
|
utopic |
Released
(24.0.1312.56-0ubuntu1)
|
|
vivid |
Released
(24.0.1312.56-0ubuntu1)
|
|
wily |
Released
(24.0.1312.56-0ubuntu1)
|
|
xenial |
Released
(24.0.1312.56-0ubuntu1)
|
|
yakkety |
Released
(24.0.1312.56-0ubuntu1)
|
|
zesty |
Released
(24.0.1312.56-0ubuntu1)
|
|
This vulnerability is mitigated in part by the use of gcc's stack protector in Ubuntu. | ||
libv8 Launchpad, Ubuntu, Debian |
artful |
Does not exist
|
bionic |
Does not exist
|
|
cosmic |
Does not exist
|
|
hardy |
Does not exist
|
|
lucid |
Ignored
(end of life)
|
|
oneiric |
Ignored
(end of life)
|
|
precise |
Ignored
(end of life)
|
|
quantal |
Ignored
(end of life)
|
|
raring |
Ignored
(end of life)
|
|
saucy |
Ignored
(end of life)
|
|
trusty |
Does not exist
|
|
upstream |
Released
(3.14.5.3)
|
|
utopic |
Does not exist
|
|
vivid |
Does not exist
|
|
wily |
Does not exist
|
|
xenial |
Does not exist
|
|
yakkety |
Does not exist
|
|
zesty |
Does not exist
|
|
This vulnerability is mitigated in part by the use of gcc's stack protector in Ubuntu. |