Numeric Errors The advisory has been revoked - it doesn't affect any version of package oxide-qt  (opens in a new tab)


Threat Intelligence

EPSS
3.2% (92nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UBUNTU1704-OXIDEQT-632216
  • published6 May 2014
  • disclosed6 May 2014

Introduced: 6 May 2014

CVE-2014-1736  (opens in a new tab)
CWE-189  (opens in a new tab)

Amendment

The Ubuntu security team deemed this advisory irrelevant for Ubuntu:17.04.

NVD Description

Note: Versions mentioned in the description apply only to the upstream oxide-qt package and not the oxide-qt package as distributed by Ubuntu.

Integer overflow in api.cc in Google V8, as used in Google Chrome before 34.0.1847.131 on Windows and OS X and before 34.0.1847.132 on Linux, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a large length value.