Bug 1150849 (CVE-2014-3195)

Summary: CVE-2014-3195 v8: information leak fixed in Google Chrome 38.0.2125.101
Product: [Other] Security Response Reporter: Murray McAllister <mmcallis>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED WONTFIX QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: abaron, aortega, apevec, ayoung, bdunne, bkearney, bleanhar, cbillett, ccoleman, chrisw, cpelland, dajohnso, dallan, dclarizi, dmcphers, gkotton, gmccullo, jdetiber, jfrey, jialiu, jkeck, joelsmith, jokerman, jorton, jprause, jrafanie, jvlcek, katello-bugs, kseifried, lhh, lmeyer, lpeer, markmc, mburns, mmaslano, mmccomas, mmccune, mmcgrath, obarenbo, rbryant, rhos-maint, sclewis, tcallawa, tchollingsworth, thrcka, tjay, tomckay, tomspur, tpopela, xlecauch, yeylon
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2015-01-21 16:24:11 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1151335, 1151338    
Bug Blocks: 1150851, 1151371    

Description Murray McAllister 2014-10-09 04:23:59 UTC
Common Vulnerabilities and Exposures assigned an identifier CVE-2014-3195 to
the following vulnerability:

Name: CVE-2014-3195
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3195
Assigned: 20140503
Reference: http://googlechromereleases.blogspot.com/2014/10/stable-channel-update.html
Reference: https://code.google.com/p/v8/source/detail?r=23144
Reference: https://code.google.com/p/v8/source/detail?r=23268
Reference: https://crbug.com/403409

Google V8, as used in Google Chrome before 38.0.2125.101, does not
properly track JavaScript heap-memory allocations as allocations of
uninitialized memory and does not properly concatenate arrays of
double-precision floating-point numbers, which allows remote attackers
to obtain sensitive information via crafted JavaScript code, related
to the PagedSpace::AllocateRaw and NewSpace::AllocateRaw functions in
heap/spaces-inl.h, the LargeObjectSpace::AllocateRaw function in
heap/spaces.cc, and the Runtime_ArrayConcat function in runtime.cc.

From an initial inspection, it is not clear if the Fedora v8 packages are affected or not.

Comment 1 errata-xmlrpc 2014-10-14 08:34:41 UTC
This issue has been addressed in the following products:

  Supplementary for Red Hat Enterprise Linux 6

Via RHSA-2014:1626 https://rhn.redhat.com/errata/RHSA-2014-1626.html

Comment 5 Yadnyawalk Tale 2020-08-04 10:36:57 UTC
manifest.txt:36260:rhn_satellite:6.5/v8-3.14.5.10-19.el7sat

At this time, we have no additional z-streams planned for sat-6.5.z. Based upon that and that this is a low severity issue, closing this one as wontfix. 
Ref: https://access.redhat.com/support/policy/updates/satellite