Bug 1151422 (CVE-2014-3197) - CVE-2014-3197 chromium: information leak in XSS Auditor fixed in Chrome 38.0.2125.101
Summary: CVE-2014-3197 chromium: information leak in XSS Auditor fixed in Chrome 38.0....
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2014-3197
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1151335 1151338
Blocks: 1151371
TreeView+ depends on / blocked
 
Reported: 2014-10-10 11:20 UTC by Tomas Hoger
Modified: 2021-02-17 06:07 UTC (History)
16 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2014-10-14 08:47:05 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2014:1626 0 normal SHIPPED_LIVE Critical: chromium-browser security update 2014-10-14 11:22:06 UTC

Description Tomas Hoger 2014-10-10 11:20:59 UTC
The NavigationScheduler::schedulePageBlock function in core/loader/NavigationScheduler.cpp in Blink, as used in Google Chrome before 38.0.2125.101, does not properly provide substitute data for pages blocked by the XSS auditor, which allows remote attackers to obtain sensitive information via a crafted web site.

https://crbug.com/396544
https://src.chromium.org/viewvc/blink?revision=179240&view=revision

External References:

http://googlechromereleases.blogspot.com/2014/10/stable-channel-update.html

Comment 1 Tomas Hoger 2014-10-10 11:23:17 UTC
While WebKit contains NavigationScheduler, it does not seem to contain functionality corrected by the fix for this issue.  Note that XSS auditor is feature of the Chrome/Chromium browser, hence consider WebKitGTK versions unaffected.  I haven't investigated QtWebKit, it's likely unaffected too.

Comment 2 errata-xmlrpc 2014-10-14 08:35:15 UTC
This issue has been addressed in the following products:

  Supplementary for Red Hat Enterprise Linux 6

Via RHSA-2014:1626 https://rhn.redhat.com/errata/RHSA-2014-1626.html


Note You need to log in before you can comment on or make changes to this bug.