Описание
Google V8, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| OpenShift Enterprise 1 | ruby193-v8 | Not affected | ||
| Red Hat OpenStack Platform 3 | ruby193-v8 | Not affected | ||
| Red Hat OpenStack Platform 3 | v8 | Not affected | ||
| Red Hat Satellite 6 | v8 | Not affected | ||
| Red Hat Software Collections | v8314-v8 | Not affected | ||
| Red Hat Subscription Asset Manager | ruby193-v8 | Not affected | ||
| Red Hat Subscription Asset Manager | v8 | Not affected |
Показывать по
Дополнительная информация
Статус:
EPSS
6.8 Medium
CVSS2
Связанные уязвимости
Google V8, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.
Google V8, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.
Google V8, as used in Google Chrome before 30.0.1599.66, allows remote ...
Google V8, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.
EPSS
6.8 Medium
CVSS2