UBUNTU-CVE-2014-5256

Source
https://ubuntu.com/security/CVE-2014-5256
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2014/UBUNTU-CVE-2014-5256.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2014-5256
Related
Published
2014-09-05T17:55:00Z
Modified
2025-01-13T10:21:07Z
Summary
[none]
Details

Node.js 0.8 before 0.8.28 and 0.10 before 0.10.30 does not consider the possibility of recursive processing that triggers V8 garbage collection in conjunction with a V8 interrupt, which allows remote attackers to cause a denial of service (memory corruption and application crash) via deep JSON objects whose parsing lets this interrupt mask an overflow of the program stack.

References

Affected packages

Ubuntu:Pro:16.04:LTS / libv8-3.14

Package

Name
libv8-3.14
Purl
pkg:deb/ubuntu/libv8-3.14@3.14.5.8-5ubuntu2?arch=source&distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.14.5.8-5ubuntu2

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:Pro:18.04:LTS / libv8-3.14

Package

Name
libv8-3.14
Purl
pkg:deb/ubuntu/libv8-3.14@3.14.5.8-11ubuntu1?arch=source&distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.14.5.8-11ubuntu1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}