First published: Wed May 21 2014(Updated: )
Integer underflow in the LCodeGen::PrepareKeyedOperand function in arm/lithium-codegen-arm.cc in Google V8 before 3.25.28.16, as used in Google Chrome before 35.0.1916.114, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a negative key value.
Credit: cve-coordination@google.com chrome-cve-admin@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Fedora | =20 | |
Red Hat Fedora | =21 | |
Red Hat Fedora | =22 | |
Google V8 | <=3.25.28 | |
Google V8 | =3.25.0 | |
Google V8 | =3.25.1 | |
Google V8 | =3.25.2 | |
Google V8 | =3.25.3 | |
Google V8 | =3.25.4 | |
Google V8 | =3.25.5 | |
Google V8 | =3.25.6 | |
Google V8 | =3.25.7 | |
Google V8 | =3.25.8 | |
Google V8 | =3.25.9 | |
Google V8 | =3.25.10 | |
Google V8 | =3.25.11 | |
Google V8 | =3.25.12 | |
Google V8 | =3.25.13 | |
Google V8 | =3.25.14 | |
Google V8 | =3.25.15 | |
Google V8 | =3.25.16 | |
Google V8 | =3.25.17 | |
Google V8 | =3.25.18 | |
Google V8 | =3.25.19 | |
Google V8 | =3.25.20 | |
Google V8 | =3.25.21 | |
Google V8 | =3.25.22 | |
Google V8 | =3.25.23 | |
Google V8 | =3.25.24 | |
Google V8 | =3.25.25 | |
Google V8 | =3.25.26 | |
Google V8 | =3.25.27 | |
Google Chrome | <=35.0.1916.113 | |
Google Chrome | =35.0.1916.0 | |
Google Chrome | =35.0.1916.1 | |
Google Chrome | =35.0.1916.2 | |
Google Chrome | =35.0.1916.3 | |
Google Chrome | =35.0.1916.4 | |
Google Chrome | =35.0.1916.5 | |
Google Chrome | =35.0.1916.6 | |
Google Chrome | =35.0.1916.7 | |
Google Chrome | =35.0.1916.8 | |
Google Chrome | =35.0.1916.9 | |
Google Chrome | =35.0.1916.10 | |
Google Chrome | =35.0.1916.11 | |
Google Chrome | =35.0.1916.13 | |
Google Chrome | =35.0.1916.14 | |
Google Chrome | =35.0.1916.15 | |
Google Chrome | =35.0.1916.17 | |
Google Chrome | =35.0.1916.18 | |
Google Chrome | =35.0.1916.19 | |
Google Chrome | =35.0.1916.20 | |
Google Chrome | =35.0.1916.21 | |
Google Chrome | =35.0.1916.22 | |
Google Chrome | =35.0.1916.23 | |
Google Chrome | =35.0.1916.27 | |
Google Chrome | =35.0.1916.31 | |
Google Chrome | =35.0.1916.32 | |
Google Chrome | =35.0.1916.33 | |
Google Chrome | =35.0.1916.34 | |
Google Chrome | =35.0.1916.35 | |
Google Chrome | =35.0.1916.36 | |
Google Chrome | =35.0.1916.37 | |
Google Chrome | =35.0.1916.38 | |
Google Chrome | =35.0.1916.39 | |
Google Chrome | =35.0.1916.40 | |
Google Chrome | =35.0.1916.41 | |
Google Chrome | =35.0.1916.42 | |
Google Chrome | =35.0.1916.43 | |
Google Chrome | =35.0.1916.44 | |
Google Chrome | =35.0.1916.45 | |
Google Chrome | =35.0.1916.46 | |
Google Chrome | =35.0.1916.47 | |
Google Chrome | =35.0.1916.48 | |
Google Chrome | =35.0.1916.49 | |
Google Chrome | =35.0.1916.51 | |
Google Chrome | =35.0.1916.52 | |
Google Chrome | =35.0.1916.54 | |
Google Chrome | =35.0.1916.56 | |
Google Chrome | =35.0.1916.57 | |
Google Chrome | =35.0.1916.59 | |
Google Chrome | =35.0.1916.61 | |
Google Chrome | =35.0.1916.68 | |
Google Chrome | =35.0.1916.69 | |
Google Chrome | =35.0.1916.71 | |
Google Chrome | =35.0.1916.72 | |
Google Chrome | =35.0.1916.74 | |
Google Chrome | =35.0.1916.77 | |
Google Chrome | =35.0.1916.80 | |
Google Chrome | =35.0.1916.82 | |
Google Chrome | =35.0.1916.84 | |
Google Chrome | =35.0.1916.85 | |
Google Chrome | =35.0.1916.86 | |
Google Chrome | =35.0.1916.88 | |
Google Chrome | =35.0.1916.90 | |
Google Chrome | =35.0.1916.92 | |
Google Chrome | =35.0.1916.93 | |
Google Chrome | =35.0.1916.95 | |
Google Chrome | =35.0.1916.96 | |
Google Chrome | =35.0.1916.98 | |
Google Chrome | =35.0.1916.99 | |
Google Chrome | =35.0.1916.101 | |
Google Chrome | =35.0.1916.103 | |
Google Chrome | =35.0.1916.104 | |
Google Chrome | =35.0.1916.105 | |
Google Chrome | =35.0.1916.106 | |
Google Chrome | =35.0.1916.107 | |
Google Chrome | =35.0.1916.108 | |
Google Chrome | =35.0.1916.109 | |
Google Chrome | =35.0.1916.110 | |
Google Chrome | =35.0.1916.111 | |
Google Chrome | =35.0.1916.112 | |
=20 | ||
=21 | ||
=22 | ||
<=3.25.28 | ||
=3.25.0 | ||
=3.25.1 | ||
=3.25.2 | ||
=3.25.3 | ||
=3.25.4 | ||
=3.25.5 | ||
=3.25.6 | ||
=3.25.7 | ||
=3.25.8 | ||
=3.25.9 | ||
=3.25.10 | ||
=3.25.11 | ||
=3.25.12 | ||
=3.25.13 | ||
=3.25.14 | ||
=3.25.15 | ||
=3.25.16 | ||
=3.25.17 | ||
=3.25.18 | ||
=3.25.19 | ||
=3.25.20 | ||
=3.25.21 | ||
=3.25.22 | ||
=3.25.23 | ||
=3.25.24 | ||
=3.25.25 | ||
=3.25.26 | ||
=3.25.27 | ||
<=35.0.1916.113 | ||
=35.0.1916.0 | ||
=35.0.1916.1 | ||
=35.0.1916.2 | ||
=35.0.1916.3 | ||
=35.0.1916.4 | ||
=35.0.1916.5 | ||
=35.0.1916.6 | ||
=35.0.1916.7 | ||
=35.0.1916.8 | ||
=35.0.1916.9 | ||
=35.0.1916.10 | ||
=35.0.1916.11 | ||
=35.0.1916.13 | ||
=35.0.1916.14 | ||
=35.0.1916.15 | ||
=35.0.1916.17 | ||
=35.0.1916.18 | ||
=35.0.1916.19 | ||
=35.0.1916.20 | ||
=35.0.1916.21 | ||
=35.0.1916.22 | ||
=35.0.1916.23 | ||
=35.0.1916.27 | ||
=35.0.1916.31 | ||
=35.0.1916.32 | ||
=35.0.1916.33 | ||
=35.0.1916.34 | ||
=35.0.1916.35 | ||
=35.0.1916.36 | ||
=35.0.1916.37 | ||
=35.0.1916.38 | ||
=35.0.1916.39 | ||
=35.0.1916.40 | ||
=35.0.1916.41 | ||
=35.0.1916.42 | ||
=35.0.1916.43 | ||
=35.0.1916.44 | ||
=35.0.1916.45 | ||
=35.0.1916.46 | ||
=35.0.1916.47 | ||
=35.0.1916.48 | ||
=35.0.1916.49 | ||
=35.0.1916.51 | ||
=35.0.1916.52 | ||
=35.0.1916.54 | ||
=35.0.1916.56 | ||
=35.0.1916.57 | ||
=35.0.1916.59 | ||
=35.0.1916.61 | ||
=35.0.1916.68 | ||
=35.0.1916.69 | ||
=35.0.1916.71 | ||
=35.0.1916.72 | ||
=35.0.1916.74 | ||
=35.0.1916.77 | ||
=35.0.1916.80 | ||
=35.0.1916.82 | ||
=35.0.1916.84 | ||
=35.0.1916.85 | ||
=35.0.1916.86 | ||
=35.0.1916.88 | ||
=35.0.1916.90 | ||
=35.0.1916.92 | ||
=35.0.1916.93 | ||
=35.0.1916.95 | ||
=35.0.1916.96 | ||
=35.0.1916.98 | ||
=35.0.1916.99 | ||
=35.0.1916.101 | ||
=35.0.1916.103 | ||
=35.0.1916.104 | ||
=35.0.1916.105 | ||
=35.0.1916.106 | ||
=35.0.1916.107 | ||
=35.0.1916.108 | ||
=35.0.1916.109 | ||
=35.0.1916.110 | ||
=35.0.1916.111 | ||
=35.0.1916.112 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3152 is considered a high severity vulnerability due to its potential to cause denial of service and possibly other impacts.
To address CVE-2014-3152, users should update to the latest versions of Google V8 or Google Chrome as per the vendor's recommendations.
CVE-2014-3152 affects Google Chrome versions prior to 35.0.1916.114.
CVE-2014-3152 can be exploited through remote attacks that trigger specific negative conditions in the LCodeGen::PrepareKeyedOperand function.
Yes, Fedora versions 20, 21, and 22 are affected by CVE-2014-3152.