{ "schema_version": "1.4.0", "id": "GHSA-7wg6-6952-3vfv", "modified": "2025-04-12T13:00:02Z", "published": "2022-05-14T02:09:50Z", "aliases": [ "CVE-2016-1669" ], "details": "The Zone::New function in zone.cc in Google V8 before 5.0.71.47, as used in Google Chrome before 50.0.2661.102, does not properly determine when to expand certain memory allocations, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via crafted JavaScript code.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1669" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2017:0879" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2017:0880" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2017:0881" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2017:0882" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:0336" }, { "type": "WEB", "url": "https://codereview.chromium.org/1945313002" }, { "type": "WEB", "url": "https://crbug.com/606115" }, { "type": "WEB", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CITS5GIUTNWVSUXMSORIAJJLQBEGL2CK" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZPTKXI62OPCJCJGCSFMST4HIBQ27J72W" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CITS5GIUTNWVSUXMSORIAJJLQBEGL2CK" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZPTKXI62OPCJCJGCSFMST4HIBQ27J72W" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/201605-02" }, { "type": "WEB", "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00043.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00050.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00063.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-1080.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2017-0002.html" }, { "type": "WEB", "url": "http://www.debian.org/security/2016/dsa-3590" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/90584" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1035872" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2960-1" } ], "database_specific": { "cwe_ids": [ "CWE-119" ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2016-05-14T21:59:00Z" } }