Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2016-5219

Published: 6 December 2016

A heap use after free in V8 in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

Notes

AuthorNote
mikesalvatore
The Ubuntu Security Team does not support libv8

Priority

Medium

Cvss 3 Severity Score

6.3

Score breakdown

Status

Package Release Status
libv8-3.14
Launchpad, Ubuntu, Debian
trusty Does not exist
(trusty was ignored [libv8 not supported])
upstream Needed

xenial Ignored
(libv8 not supported)
yakkety Ignored
(end of life)
zesty Ignored
(end of life)
artful Ignored
(end of life)
bionic Ignored
(libv8 not supported)
cosmic Ignored
(end of life)
precise Does not exist

oxide-qt
Launchpad, Ubuntu, Debian
artful
Released (1.19.6-0ubuntu2)
bionic Does not exist

cosmic Does not exist

trusty
Released (1.19.4-0ubuntu0.14.04.1)
upstream
Released (1.19.4)
xenial
Released (1.19.4-0ubuntu0.16.04.1)
yakkety
Released (1.19.4-0ubuntu0.16.10.1)
zesty
Released (1.19.6-0ubuntu2)
precise Does not exist

chromium-browser
Launchpad, Ubuntu, Debian
precise Ignored

trusty
Released (58.0.3029.81-0ubuntu0.14.04.1172)
upstream
Released (55.0.2883.75)
artful
Released (55.0.2883.87-0ubuntu1)
bionic
Released (55.0.2883.87-0ubuntu1)
cosmic
Released (55.0.2883.87-0ubuntu1)
xenial
Released (55.0.2883.87-0ubuntu0.16.04.1263)
yakkety
Released (55.0.2883.87-0ubuntu0.16.10.1328)
zesty
Released (55.0.2883.87-0ubuntu1)
libv8
Launchpad, Ubuntu, Debian
artful Does not exist

bionic Does not exist

cosmic Does not exist

precise Ignored
(end of life)
trusty Does not exist

upstream Needs triage

xenial Does not exist

yakkety Does not exist

zesty Does not exist

Severity score breakdown

Parameter Value
Base score 6.3
Attack vector Network
Attack complexity Low
Privileges required None
User interaction Required
Scope Unchanged
Confidentiality Low
Integrity impact Low
Availability impact Low
Vector CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L