drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Zwei Probleme in v8
Name: |
Zwei Probleme in v8 |
|
ID: |
FEDORA-2013-23401 |
|
Distribution: |
Fedora |
|
Plattformen: |
Fedora 18 |
|
Datum: |
Di, 24. Dezember 2013, 11:34 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6639
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6640 |
|
Applikationen: |
V8 |
|
Originalnachricht |
Name : v8 Product : Fedora 18 Version : 3.14.5.10 Release : 3.fc18 URL : http://code.google.com/p/v8 Summary : JavaScript Engine Description : V8 is Google's open source JavaScript engine. V8 is written in C++ and is used in Google Chrome, the open source browser from Google. V8 implements ECMAScript as specified in ECMA-262, 3rd edition.
------------------------------------------------------------------------------- - Update Information:
This update resolves multiple security vulnerabilities in the V8 JavaScript just-in-time compiler.
--
Common Vulnerabilities and Exposures assigned an identifier CVE-2013-6640 to the following vulnerability:
Name: CVE-2013-6640
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6640
Assigned: 20131105
Reference: http://code.google.com/p/v8/source/detail?r=17801
Reference: stable-channel-update.html Reference: https://code.google.com/p/chromium/issues/detail?id=319860
The DehoistArrayIndex function in hydrogen-dehoist.cc in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds read) via JavaScript code that sets a variable to the value of an array element with a crafted index.
--
Common Vulnerabilities and Exposures assigned an identifier CVE-2013-6639 to the following vulnerability:
Name: CVE-2013-6639
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6639
Assigned: 20131105
Reference: http://code.google.com/p/v8/source/detail?r=17801
Reference: stable-channel-update.html Reference: https://code.google.com/p/chromium/issues/detail?id=319835
The DehoistArrayIndex function in hydrogen-dehoist.cc in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via JavaScript code that sets the value of an array element with a crafted index. ------------------------------------------------------------------------------- - ChangeLog:
* Fri Dec 13 2013 T.C. Hollingsworth <tchollingsworth@gmail.com> - 1:3.14.5.10-3 - backport fix for out-of-bounds read DoS (RHBZ#1039889; CVE-2013-6640) * Fri Aug 2 2013 T.C. Hollingsworth <tchollingsworth@gmail.com> - 1:3.14.5.10-2 - backport fix for remote DoS or unspecified other impact via type confusion (RHBZ#991116; CVE-2013-2882) * Wed May 29 2013 T.C. Hollingsworth <tchollingsworth@gmail.com> - 1:3.14.5.10-1 - new upstream release 3.14.5.10 * Mon May 6 2013 Stanislav Ochotnicky <sochotnicky@redhat.com> - 1:3.14.5.8-2 - Fix ownership of include directory (#958729) * Fri Mar 22 2013 T.C. Hollingsworth <tchollingsworth@gmail.com> - 1:3.14.5.8-1 - new upstream release 3.14.5.8 - backport security fix for remote DoS via crafted javascript (RHBZ#924495; CVE-2013-2632) * Mon Mar 11 2013 Stephen Gallagher <sgallagh@redhat.com> - 1:3.14.5.7-3 - Update to v8 3.14.5.7 for Node.js 0.10.0 * Sat Jan 26 2013 T.C. Hollingsworth <tchollingsworth@gmail.com> - 1:3.13.7.5-2 - rebuild for icu-50 - ignore new GCC 4.8 warning * Tue Dec 4 2012 Tom Callaway <spot@fedoraproject.org> - 1:3.13.7.5-1 - update to 3.13.7.5 (needed for chromium 23) - Resolves multiple security issues (CVE-2012-5120, CVE-2012-5128) - d8 is now using a static libv8, resolves bz 881973) ------------------------------------------------------------------------------- - References:
[ 1 ] Bug #1039888 - CVE-2013-6639 v8: DoS (out-of-bounds write) in DehoistArrayIndex function in hydrogen.cc https://bugzilla.redhat.com/show_bug.cgi?id=1039888 [ 2 ] Bug #1039889 - CVE-2013-6640 v8: DoS (out-of-bounds read) in DehoistArrayIndex function in hydrogen.cc https://bugzilla.redhat.com/show_bug.cgi?id=1039889 ------------------------------------------------------------------------------- -
This update can be installed with the "yum" update program. Use su -c 'yum update v8' at the command line. For more information, refer to "Managing Software with yum", available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys ------------------------------------------------------------------------------- - _______________________________________________ package-announce mailing list package-announce@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/package-announce
|
|
|
|