Login
Newsletter
Werbung

Sicherheit: Zwei Probleme in v8
Aktuelle Meldungen Distributionen
Name: Zwei Probleme in v8
ID: FEDORA-2013-23401
Distribution: Fedora
Plattformen: Fedora 18
Datum: Di, 24. Dezember 2013, 11:34
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6639
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6640
Applikationen: v8

Originalnachricht

Name        : v8
Product : Fedora 18
Version : 3.14.5.10
Release : 3.fc18
URL : http://code.google.com/p/v8
Summary : JavaScript Engine
Description :
V8 is Google's open source JavaScript engine. V8 is written in C++ and is
used
in Google Chrome, the open source browser from Google. V8 implements ECMAScript
as specified in ECMA-262, 3rd edition.

-------------------------------------------------------------------------------
-
Update Information:

This update resolves multiple security vulnerabilities in the V8 JavaScript
just-in-time compiler.

--

Common Vulnerabilities and Exposures assigned an identifier CVE-2013-6640 to
the following vulnerability:

Name: CVE-2013-6640
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6640
Assigned: 20131105
Reference: http://code.google.com/p/v8/source/detail?r=17801
Reference: stable-channel-update.html
Reference: https://code.google.com/p/chromium/issues/detail?id=319860

The DehoistArrayIndex function in hydrogen-dehoist.cc in Google V8 before
3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds read) via JavaScript code that sets a variable to the value of an array element with a crafted index.

--

Common Vulnerabilities and Exposures assigned an identifier CVE-2013-6639 to
the following vulnerability:

Name: CVE-2013-6639
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6639
Assigned: 20131105
Reference: http://code.google.com/p/v8/source/detail?r=17801
Reference: stable-channel-update.html
Reference: https://code.google.com/p/chromium/issues/detail?id=319835

The DehoistArrayIndex function in hydrogen-dehoist.cc in Google V8 before
3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via JavaScript code that sets the value of an array element with a crafted index.
-------------------------------------------------------------------------------
-
ChangeLog:

* Fri Dec 13 2013 T.C. Hollingsworth <tchollingsworth@gmail.com> -
1:3.14.5.10-3
- backport fix for out-of-bounds read DoS (RHBZ#1039889; CVE-2013-6640)
* Fri Aug 2 2013 T.C. Hollingsworth <tchollingsworth@gmail.com> -
1:3.14.5.10-2
- backport fix for remote DoS or unspecified other impact via type confusion
(RHBZ#991116; CVE-2013-2882)
* Wed May 29 2013 T.C. Hollingsworth <tchollingsworth@gmail.com> -
1:3.14.5.10-1
- new upstream release 3.14.5.10
* Mon May 6 2013 Stanislav Ochotnicky <sochotnicky@redhat.com> -
1:3.14.5.8-2
- Fix ownership of include directory (#958729)
* Fri Mar 22 2013 T.C. Hollingsworth <tchollingsworth@gmail.com> -
1:3.14.5.8-1
- new upstream release 3.14.5.8
- backport security fix for remote DoS via crafted javascript (RHBZ#924495;
CVE-2013-2632)
* Mon Mar 11 2013 Stephen Gallagher <sgallagh@redhat.com> - 1:3.14.5.7-3
- Update to v8 3.14.5.7 for Node.js 0.10.0
* Sat Jan 26 2013 T.C. Hollingsworth <tchollingsworth@gmail.com> -
1:3.13.7.5-2
- rebuild for icu-50
- ignore new GCC 4.8 warning
* Tue Dec 4 2012 Tom Callaway <spot@fedoraproject.org> - 1:3.13.7.5-1
- update to 3.13.7.5 (needed for chromium 23)
- Resolves multiple security issues (CVE-2012-5120, CVE-2012-5128)
- d8 is now using a static libv8, resolves bz 881973)
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1039888 - CVE-2013-6639 v8: DoS (out-of-bounds write) in
DehoistArrayIndex function in hydrogen.cc
https://bugzilla.redhat.com/show_bug.cgi?id=1039888
[ 2 ] Bug #1039889 - CVE-2013-6640 v8: DoS (out-of-bounds read) in
DehoistArrayIndex function in hydrogen.cc
https://bugzilla.redhat.com/show_bug.cgi?id=1039889
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update v8' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Gewinnspiel
Neue Nachrichten
Werbung