Red Hat Security Advisory 2014-1744-01 - V8 is Google's open source JavaScript engine. It was discovered that V8 did not properly check the stack size limit in certain cases. A remote attacker able to send a request that caused a script executed by V8 to use deep recursion could trigger a stack overflow, leading to a crash of an application using V8. Multiple flaws were discovered in V8. Untrusted JavaScript code executed by V8 could use either of these flaws to crash V8 or, possibly, execute arbitrary code with the privileges of the user running V8.
e802520edef60024e56d1cd85e5ac99fc243bce62e6c6b92b128f61cf6d76168
Gentoo Linux Security Advisory 201408-16 - Multiple vulnerabilities have been found in Chromium, the worst of which can allow remote attackers to execute arbitrary code. Versions less than 37.0.2062.94 are affected.
f982e5d93f95183c0a72615e79486d596bdaa8fc191f532f95a4c5751a9c6d6d
Debian Linux Security Advisory 2883-1 - Several vulnerabilities have been discovered in the chromium web browser.
20d2cc124c759b4aeafe649d18d538e924cbb1dda3765de0b62d0d053aa72638