[SECURITY] Fedora EPEL 6 Update: v8-3.14.5.10-6.el6
updates at fedoraproject.org
updates at fedoraproject.org
Wed Mar 19 20:23:07 UTC 2014
--------------------------------------------------------------------------------
Fedora EPEL Update Notification
FEDORA-EPEL-2014-0700
2014-03-01 06:33:40
--------------------------------------------------------------------------------
Name : v8
Product : Fedora EPEL 6
Version : 3.14.5.10
Release : 6.el6
URL : http://code.google.com/p/v8
Summary : JavaScript Engine
Description :
V8 is Google's open source JavaScript engine. V8 is written in C++ and is used
in Google Chrome, the open source browser from Google. V8 implements ECMAScript
as specified in ECMA-262, 3rd edition.
--------------------------------------------------------------------------------
Update Information:
Common Vulnerabilities and Exposures assigned an identifier CVE-2013-6650 to
the following vulnerability:
Name: CVE-2013-6650
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6650
The StoreBuffer::ExemptPopularPages function in store-buffer.cc in
Google V8 before 3.22.24.16, as used in Google Chrome before
32.0.1700.102, allows remote attackers to cause a denial of service
(memory corruption) or possibly have unspecified other impact via
vectors that trigger incorrect handling of "popular pages."
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #1059070 - CVE-2013-6650 v8: incorrect handling of popular pages
https://bugzilla.redhat.com/show_bug.cgi?id=1059070
--------------------------------------------------------------------------------
This update can be installed with the "yum" update programs. Use
su -c 'yum update v8' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora EPEL GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
More information about the epel-package-announce
mailing list