The LoadBuffer implementation in Google V8, as used in Google Chrome before 50.0.2661.75, mishandles data types, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers an out-of-bounds write operation, related to compiler/pipeline.cc and compiler/simplified-lowering.cc.
CPE | Name | Operator | Version |
---|---|---|---|
ubuntu_linux | eq | 16.04 | |
ubuntu_linux | eq | 15.10 | |
ubuntu_linux | eq | 14.04 | |
debian_linux | eq | 8.0 | |
chrome | le | 49.0.2623.112 | |
leap | eq | 42.1 | |
linux_enterprise | eq | 12.0 |
lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html
lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html
lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html
lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html
rhn.redhat.com/errata/RHSA-2016-0638.html
www.debian.org/security/2016/dsa-3549
www.ubuntu.com/usn/USN-2955-1
codereview.chromium.org/1740123002
crbug.com/589792
googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html
security.gentoo.org/glsa/201605-02