First published: Wed May 21 2014(Updated: )
Integer underflow in the LCodeGen::PrepareKeyedOperand function in arm/lithium-codegen-arm.cc in Google V8 before 3.25.28.16, as used in Google Chrome before 35.0.1916.114, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a negative key value.
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fedoraproject Fedora | =20 | |
Fedoraproject Fedora | =21 | |
Fedoraproject Fedora | =22 | |
Google V8 | <=3.25.28 | |
Google V8 | =3.25.0 | |
Google V8 | =3.25.1 | |
Google V8 | =3.25.2 | |
Google V8 | =3.25.3 | |
Google V8 | =3.25.4 | |
Google V8 | =3.25.5 | |
Google V8 | =3.25.6 | |
Google V8 | =3.25.7 | |
Google V8 | =3.25.8 | |
Google V8 | =3.25.9 | |
Google V8 | =3.25.10 | |
Google V8 | =3.25.11 | |
Google V8 | =3.25.12 | |
Google V8 | =3.25.13 | |
Google V8 | =3.25.14 | |
Google V8 | =3.25.15 | |
Google V8 | =3.25.16 | |
Google V8 | =3.25.17 | |
Google V8 | =3.25.18 | |
Google V8 | =3.25.19 | |
Google V8 | =3.25.20 | |
Google V8 | =3.25.21 | |
Google V8 | =3.25.22 | |
Google V8 | =3.25.23 | |
Google V8 | =3.25.24 | |
Google V8 | =3.25.25 | |
Google V8 | =3.25.26 | |
Google V8 | =3.25.27 | |
Google Chrome | <=35.0.1916.113 | |
Google Chrome | =35.0.1916.0 | |
Google Chrome | =35.0.1916.1 | |
Google Chrome | =35.0.1916.2 | |
Google Chrome | =35.0.1916.3 | |
Google Chrome | =35.0.1916.4 | |
Google Chrome | =35.0.1916.5 | |
Google Chrome | =35.0.1916.6 | |
Google Chrome | =35.0.1916.7 | |
Google Chrome | =35.0.1916.8 | |
Google Chrome | =35.0.1916.9 | |
Google Chrome | =35.0.1916.10 | |
Google Chrome | =35.0.1916.11 | |
Google Chrome | =35.0.1916.13 | |
Google Chrome | =35.0.1916.14 | |
Google Chrome | =35.0.1916.15 | |
Google Chrome | =35.0.1916.17 | |
Google Chrome | =35.0.1916.18 | |
Google Chrome | =35.0.1916.19 | |
Google Chrome | =35.0.1916.20 | |
Google Chrome | =35.0.1916.21 | |
Google Chrome | =35.0.1916.22 | |
Google Chrome | =35.0.1916.23 | |
Google Chrome | =35.0.1916.27 | |
Google Chrome | =35.0.1916.31 | |
Google Chrome | =35.0.1916.32 | |
Google Chrome | =35.0.1916.33 | |
Google Chrome | =35.0.1916.34 | |
Google Chrome | =35.0.1916.35 | |
Google Chrome | =35.0.1916.36 | |
Google Chrome | =35.0.1916.37 | |
Google Chrome | =35.0.1916.38 | |
Google Chrome | =35.0.1916.39 | |
Google Chrome | =35.0.1916.40 | |
Google Chrome | =35.0.1916.41 | |
Google Chrome | =35.0.1916.42 | |
Google Chrome | =35.0.1916.43 | |
Google Chrome | =35.0.1916.44 | |
Google Chrome | =35.0.1916.45 | |
Google Chrome | =35.0.1916.46 | |
Google Chrome | =35.0.1916.47 | |
Google Chrome | =35.0.1916.48 | |
Google Chrome | =35.0.1916.49 | |
Google Chrome | =35.0.1916.51 | |
Google Chrome | =35.0.1916.52 | |
Google Chrome | =35.0.1916.54 | |
Google Chrome | =35.0.1916.56 | |
Google Chrome | =35.0.1916.57 | |
Google Chrome | =35.0.1916.59 | |
Google Chrome | =35.0.1916.61 | |
Google Chrome | =35.0.1916.68 | |
Google Chrome | =35.0.1916.69 | |
Google Chrome | =35.0.1916.71 | |
Google Chrome | =35.0.1916.72 | |
Google Chrome | =35.0.1916.74 | |
Google Chrome | =35.0.1916.77 | |
Google Chrome | =35.0.1916.80 | |
Google Chrome | =35.0.1916.82 | |
Google Chrome | =35.0.1916.84 | |
Google Chrome | =35.0.1916.85 | |
Google Chrome | =35.0.1916.86 | |
Google Chrome | =35.0.1916.88 | |
Google Chrome | =35.0.1916.90 | |
Google Chrome | =35.0.1916.92 | |
Google Chrome | =35.0.1916.93 | |
Google Chrome | =35.0.1916.95 | |
Google Chrome | =35.0.1916.96 | |
Google Chrome | =35.0.1916.98 | |
Google Chrome | =35.0.1916.99 | |
Google Chrome | =35.0.1916.101 | |
Google Chrome | =35.0.1916.103 | |
Google Chrome | =35.0.1916.104 | |
Google Chrome | =35.0.1916.105 | |
Google Chrome | =35.0.1916.106 | |
Google Chrome | =35.0.1916.107 | |
Google Chrome | =35.0.1916.108 | |
Google Chrome | =35.0.1916.109 | |
Google Chrome | =35.0.1916.110 | |
Google Chrome | =35.0.1916.111 | |
Google Chrome | =35.0.1916.112 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.