CVE-2013-2838
Publication date 22 May 2013
Last updated 24 July 2024
Ubuntu priority
Google V8, as used in Google Chrome before 27.0.1453.93, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
Status
Package | Ubuntu Release | Status |
---|---|---|
chromium-browser | ||
18.04 LTS bionic |
Fixed 28.0.1500.52-0ubuntu2
|
|
16.04 LTS xenial |
Fixed 28.0.1500.52-0ubuntu2
|
|
14.04 LTS trusty |
Fixed 28.0.1500.52-0ubuntu2
|
|
libv8 | ||
18.04 LTS bionic | Not in release | |
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
libv8-3.14 | ||
18.04 LTS bionic | Ignored libv8 not supported | |
16.04 LTS xenial | Ignored libv8 not supported | |
14.04 LTS trusty | Not in release | |
qtjsbackend-opensource-src | ||
18.04 LTS bionic | Not in release | |
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
Notes
jdstrand
qtjsbackend-opensource-src contains an embedded libv8, however applications using qtjsbackend-opensource-src should not process untrusted javascript and therefore Ubuntu will not process updates for libv8 in this package. (See LP: #1157732 for details)
seth-arnold
I didn’t find any information on this from libv8 upstream
mikesalvatore
The Ubuntu Security Team does not support libv8
References
Other references
- https://code.google.com/p/chromium/issues/detail?id=235311
- http://googlechromereleases.blogspot.com/2013/05/stable-channel-release.html
- https://code.google.com/p/chromium/issues/detail?id=241595
- https://code.google.com/p/chromium/issues/detail?id=236631
- https://code.google.com/p/chromium/issues/detail?id=232865
- https://code.google.com/p/chromium/issues/detail?id=232532
- https://code.google.com/p/chromium/issues/detail?id=232389
- https://code.google.com/p/chromium/issues/detail?id=231725
- https://code.google.com/p/chromium/issues/detail?id=229402
- https://code.google.com/p/chromium/issues/detail?id=227390
- https://code.google.com/p/chromium/issues/detail?id=226659
- https://code.google.com/p/chromium/issues/detail?id=226090
- https://code.google.com/p/chromium/issues/detail?id=226012
- https://code.google.com/p/chromium/issues/detail?id=225979
- https://code.google.com/p/chromium/issues/detail?id=225403
- https://code.google.com/p/chromium/issues/detail?id=224920
- https://code.google.com/p/chromium/issues/detail?id=223145
- https://code.google.com/p/chromium/issues/detail?id=223125
- https://code.google.com/p/chromium/issues/detail?id=223034
- https://code.google.com/p/chromium/issues/detail?id=222770
- https://code.google.com/p/chromium/issues/detail?id=222754
- https://code.google.com/p/chromium/issues/detail?id=222036
- https://code.google.com/p/chromium/issues/detail?id=196648
- https://code.google.com/p/chromium/issues/detail?id=196575
- https://code.google.com/p/chromium/issues/detail?id=196571
- https://code.google.com/p/chromium/issues/detail?id=181438
- https://code.google.com/p/chromium/issues/detail?id=181375
- https://code.google.com/p/chromium/issues/detail?id=180920
- https://code.google.com/p/chromium/issues/detail?id=180058
- https://code.google.com/p/chromium/issues/detail?id=179580
- https://code.google.com/p/chromium/issues/detail?id=178761
- https://code.google.com/p/chromium/issues/detail?id=178581
- https://code.google.com/p/chromium/issues/detail?id=178269
- https://code.google.com/p/chromium/issues/detail?id=178130
- https://code.google.com/p/chromium/issues/detail?id=177815
- https://code.google.com/p/chromium/issues/detail?id=176719
- https://code.google.com/p/chromium/issues/detail?id=174920
- https://code.google.com/p/chromium/issues/detail?id=173672
- https://code.google.com/p/chromium/issues/detail?id=173397
- https://code.google.com/p/chromium/issues/detail?id=170715
- https://code.google.com/p/chromium/issues/detail?id=168050
- https://code.google.com/p/chromium/issues/detail?id=162896
- http://googlechromereleases.blogspot.com/2013/05/stable-channel-release.html
- https://www.cve.org/CVERecord?id=CVE-2013-2838