The LoadBuffer implementation in Google V8, as used in Google Chrome before 50.0.2661.75, mishandles data types, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers an out-of-bounds write operation, related to compiler/pipeline.cc and compiler/simplified-lowering.cc.
https://security.gentoo.org/glsa/201605-02
https://codereview.chromium.org/1740123002
http://www.ubuntu.com/usn/USN-2955-1
http://www.debian.org/security/2016/dsa-3549
http://rhn.redhat.com/errata/RHSA-2016-0638.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html
http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html