Bug 1150848 (CVE-2014-3188)

Summary: CVE-2014-3188 v8: IPC and v8 issue fixed in Google Chrome 38.0.2125.101
Product: [Other] Security Response Reporter: Murray McAllister <mmcallis>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED WONTFIX QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: abaron, aortega, apevec, ayoung, bdunne, bkearney, bleanhar, cbillett, ccoleman, chrisw, cpelland, dajohnso, dallan, dclarizi, dmcphers, gkotton, gmccullo, jdetiber, jfrey, jialiu, jkeck, joelsmith, jokerman, jorton, jprause, jrafanie, jvlcek, katello-bugs, kseifried, lhh, lmeyer, lpeer, markmc, mburns, mmaslano, mmccomas, mmccune, mmcgrath, obarenbo, rbryant, rhos-maint, sclewis, tcallawa, tchollingsworth, thrcka, tjay, tomckay, tomspur, tpopela, xlecauch, yeylon
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2015-01-21 16:23:57 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1151335, 1151338    
Bug Blocks: 1150851, 1151371    

Description Murray McAllister 2014-10-09 04:21:31 UTC
Common Vulnerabilities and Exposures assigned an identifier CVE-2014-3188 to
the following vulnerability:

Name: CVE-2014-3188
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3188
Assigned: 20140503
Reference: http://googlechromereleases.blogspot.com/2014/10/stable-channel-update-for-chrome-os.html
Reference: http://googlechromereleases.blogspot.com/2014/10/stable-channel-update.html
Reference: https://code.google.com/p/v8/source/detail?r=24125
Reference: https://crbug.com/416449

Google Chrome before 38.0.2125.101 and Chrome OS before 38.0.2125.101
do not properly handle the interaction of IPC and Google V8, which
allows remote attackers to execute arbitrary code via vectors
involving JSON data, related to improper parsing of an escaped index
by ParseJsonObject in json-parser.h.

From an initial inspection, the affected function does not appear to be in Fedora v8 or the ruby193-v8-3.14.5.10 packages.

Comment 3 errata-xmlrpc 2014-10-14 08:34:35 UTC
This issue has been addressed in the following products:

  Supplementary for Red Hat Enterprise Linux 6

Via RHSA-2014:1626 https://rhn.redhat.com/errata/RHSA-2014-1626.html

Comment 7 Yadnyawalk Tale 2020-08-04 10:37:53 UTC
manifest.txt:36260:rhn_satellite:6.5/v8-3.14.5.10-19.el7sat

At this time, we have no additional z-streams planned for sat-6.5.z. Based upon that and that this is a low severity issue, closing this one as wontfix. 
Ref: https://access.redhat.com/support/policy/updates/satellite