CVE-2015-5605
Publication date 22 July 2015
Last updated 24 July 2024
Ubuntu priority
The regular-expression implementation in Google V8, as used in Google Chrome before 44.0.2403.89, mishandles interrupts, which allows remote attackers to cause a denial of service (application crash) via crafted JavaScript code, as demonstrated by an error in garbage collection during allocation of a stack-overflow exception message.
Status
Package | Ubuntu Release | Status |
---|---|---|
chromium-browser | ||
18.04 LTS bionic |
Fixed 44.0.2403.89-0ubuntu1.1195
|
|
16.04 LTS xenial |
Fixed 44.0.2403.89-0ubuntu1.1195
|
|
14.04 LTS trusty |
Fixed 44.0.2403.89-0ubuntu0.14.04.1.1095
|
|
libv8 | ||
18.04 LTS bionic | Not in release | |
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
libv8-3.14 | ||
18.04 LTS bionic | Ignored libv8 not supported | |
16.04 LTS xenial | Ignored libv8 not supported | |
14.04 LTS trusty | Not in release | |
oxide-qt | ||
18.04 LTS bionic | Not in release | |
16.04 LTS xenial |
Fixed 1.8.4-0ubuntu1
|
|
14.04 LTS trusty |
Fixed 1.8.4-0ubuntu0.14.04.1
|
|
Notes
Patch details
Package | Patch details |
---|---|
chromium-browser | |
libv8 |
References
Related Ubuntu Security Notices (USN)
- USN-2677-1
- Oxide vulnerabilities
- 4 August 2015