CVE-2014-5256

Impact:
Moderate
Public Date:
2014-07-31
CWE:
CWE-121
Bugzilla:
1125464: CVE-2014-5256 V8 Memory Corruption and Stack Overflow
It was discovered that V8 did not properly check the stack size limit in certain cases. A remote attacker able to send a request that caused a script executed by V8 to use deep recursion could trigger a stack overflow, leading to a crash of an application using V8.

Find out more about CVE-2014-5256 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

Red Hat Product Security has rated this issue as having Low security impact in Red Hat Enterprise Linux OpenStack Platform. This issue is not currently planned to be addressed in a future security update.

CVSS v2 metrics

Base Score 6.8
Base Metrics AV:N/AC:M/Au:N/C:P/I:P/A:P
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Software Collections 1 for Red Hat Enterprise Linux 6 (v8314-v8) RHSA-2014:1744 2014-10-30
Red Hat Software Collections 1 for Red Hat Enterprise Linux 7 (v8314-v8) RHSA-2014:1744 2014-10-30

Affected Packages State

Platform Package State
Red Hat Subscription Asset Manager 1 v8 Will not fix
Red Hat Subscription Asset Manager 1 ruby193-v8 Will not fix
Red Hat Satellite 6 v8 Will not fix
Red Hat OpenShift Enterprise 2 v8 Will not fix
Red Hat OpenShift Enterprise 1 ruby193-v8 Will not fix
Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) v8 Will not fix
Red Hat Enterprise Linux OpenStack Platform 4.0 v8 Will not fix
Red Hat Enterprise Linux OpenStack Platform 4.0 ruby193-v8 Will not fix

Last Modified
Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.