← Voltar para CVEs
CVE-2016-1649
N/ADescricao
The Program::getUniformInternal function in Program.cpp in libANGLE, as used in Google Chrome before 49.0.2623.108, does not properly handle a certain data-type mismatch, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via crafted shader stages.
Detalhes CVE
Pontuacao CVSS v3.1N/A
Publicado3/29/2016
Ultima modificacao5/6/2026
Fontenvd
Avistamentos honeypot0
Produtos afetados
canonical:ubuntu_linuxdebian:debian_linuxgoogle:chromeopensuse:opensuse
Fraquezas (CWE)
CWE-119
Referencias
http://googlechromereleases.blogspot.com/2016/03/stable-channel-update_24.html(chrome-cve-admin@google.com)
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00000.html(chrome-cve-admin@google.com)
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00001.html(chrome-cve-admin@google.com)
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00039.html(chrome-cve-admin@google.com)
http://rhn.redhat.com/errata/RHSA-2016-0525.html(chrome-cve-admin@google.com)
http://www.debian.org/security/2016/dsa-3531(chrome-cve-admin@google.com)
http://www.securitytracker.com/id/1035423(chrome-cve-admin@google.com)
http://www.ubuntu.com/usn/USN-2955-1(chrome-cve-admin@google.com)
http://www.zerodayinitiative.com/advisories/ZDI-16-224(chrome-cve-admin@google.com)
https://chromium-review.googlesource.com/334448(chrome-cve-admin@google.com)
https://code.google.com/p/chromium/issues/detail?id=595836(chrome-cve-admin@google.com)
https://security.gentoo.org/glsa/201605-02(chrome-cve-admin@google.com)
http://googlechromereleases.blogspot.com/2016/03/stable-channel-update_24.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00000.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00001.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00039.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2016-0525.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2016/dsa-3531(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1035423(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-2955-1(af854a3a-2127-422b-91ae-364da2661108)
http://www.zerodayinitiative.com/advisories/ZDI-16-224(af854a3a-2127-422b-91ae-364da2661108)
https://chromium-review.googlesource.com/334448(af854a3a-2127-422b-91ae-364da2661108)
https://code.google.com/p/chromium/issues/detail?id=595836(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/201605-02(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.