{"id":"CVE-2016-1669","details":"The Zone::New function in zone.cc in Google V8 before 5.0.71.47, as used in Google Chrome before 50.0.2661.102, does not properly determine when to expand certain memory allocations, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via crafted JavaScript code.","modified":"2026-04-16T06:17:32.902723731Z","published":"2016-05-14T21:59:09.460Z","related":["openSUSE-SU-2024:10171-1","openSUSE-SU-2024:10247-1","openSUSE-SU-2024:12948-1"],"references":[{"type":"WEB","url":"http://lists.opensuse.org/opensuse-updates/2016-07/msg00063.html"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZPTKXI62OPCJCJGCSFMST4HIBQ27J72W/"},{"type":"WEB","url":"https://codereview.chromium.org/1945313002"},{"type":"WEB","url":"https://crbug.com/606115"},{"type":"WEB","url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CITS5GIUTNWVSUXMSORIAJJLQBEGL2CK/"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00043.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html"},{"type":"WEB","url":"http://www.securityfocus.com/bid/90584"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00050.html"},{"type":"WEB","url":"http://www.securitytracker.com/id/1035872"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3590"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2960-1"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:0879"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201605-02"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0002.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:0336"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-1080.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:0880"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:0881"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:0882"},{"type":"ARTICLE","url":"http://googlechromereleases.blogspot.com/2016/05/stable-channel-update.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/nodejs/node","events":[{"introduced":"0"},{"last_affected":"0d8021e5a4cf0a6aa3a700a361f6d42c2894f2ba"},{"introduced":"0"},{"last_affected":"64eacd8741f23cb91569faf7ec793c83badb04e3"},{"introduced":"163ca274230fce536afe76c64676c332693ad7c1"},{"fixed":"5f6827d244c15f9e13f13f14fadf16f988a2434b"},{"introduced":"2b18916ff054309a07408719b62e2b6a4f1e056a"},{"fixed":"2bd9dabf798fb7e00f6bbdfa0f68e6da211d22cb"},{"introduced":"f9f837885343a2a3f5ba2b8c510eaac395c8c865"},{"last_affected":"85df6ada477715020dbd22e2fb5e687d84d663ff"},{"introduced":"384e6c2dfe968002800bc3d3224a57aa19ffdfee"},{"fixed":"325e1194ce111d43b31dfdf2e2944a73411276d9"},{"introduced":"ce3e3c5fe15479475c068482c48eb9cbf1ac9df5"},{"last_affected":"a4705f62def103757112b58bfe9a4ab9e2767284"},{"introduced":"0"},{"last_affected":"7a4f260c5df43caa2f522e739b7cc3e7595d7e09"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"8.0"},{"introduced":"0"},{"last_affected":"13.1"},{"introduced":"0.10.0"},{"fixed":"0.10.46"},{"introduced":"0.12.0"},{"fixed":"0.12.15"},{"introduced":"4.0.0"},{"last_affected":"4.1.2"},{"introduced":"5.0.0"},{"fixed":"5.12.0"},{"introduced":"6.0.0"},{"last_affected":"6.2.0"},{"introduced":"0"},{"last_affected":"15.10"}]}},{"type":"GIT","repo":"https://github.com/v8/v8","events":[{"introduced":"0"},{"last_affected":"ad16e6c2cbd2c6b0f2e8ff944ac245561c682ac2"},{"introduced":"0"},{"fixed":"86aa944825a96e2fe80e85f479e4a805d0868cf9"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"5.0.71"},{"introduced":"4.2.0"},{"fixed":"4.4.6"}]}}],"versions":["3.21.18","3.26.30","3.28.33","3.28.34","3.28.36","3.28.37","3.28.39","3.28.40","3.28.41","3.28.42","3.28.44","3.28.46","3.28.47","3.28.49","3.28.55","3.28.56","3.28.58","3.28.61","3.28.63","3.28.66","3.28.67","3.28.68","3.28.70","3.28.72","3.29.1","3.29.12","3.29.13","3.29.15","3.29.18","3.29.19","3.29.2","3.29.21","3.29.22","3.29.26","3.29.28","3.29.3","3.29.30","3.29.31","3.29.32","3.29.33","3.29.34","3.29.36","3.29.37","3.29.39","3.29.4","3.29.42","3.29.44","3.29.45","3.29.46","3.29.47","3.29.48","3.29.49","3.29.5","3.29.51","3.29.52","3.29.54","3.29.55","3.29.56","3.29.58","3.29.6","3.29.60","3.29.61","3.29.62","3.29.63","3.29.65","3.29.67","3.29.68","3.29.69","3.29.7","3.29.71","3.29.72","3.29.73","3.29.76","3.29.77","3.29.79","3.29.8","3.29.80","3.29.85","3.29.86","5.0.71","v0.0.1","v0.0.2","v0.0.3","v0.0.4","v0.0.6","v0.1.0","v0.1.1","v0.1.10","v0.1.100","v0.1.101","v0.1.102","v0.1.103","v0.1.104","v0.1.11","v0.1.12","v0.1.13","v0.1.14","v0.1.15","v0.1.16","v0.1.17","v0.1.18","v0.1.19","v0.1.2","v0.1.20","v0.1.21","v0.1.22","v0.1.23","v0.1.24","v0.1.25","v0.1.26","v0.1.27","v0.1.28","v0.1.29","v0.1.3","v0.1.30","v0.1.31","v0.1.32","v0.1.33","v0.1.4","v0.1.5","v0.1.6","v0.1.7","v0.1.8","v0.1.9","v0.1.92","v0.1.93","v0.1.94","v0.1.95","v0.1.96","v0.1.97","v0.1.98","v0.1.99","v0.10.41","v0.10.42","v0.10.43","v0.10.44","v0.10.45","v0.12.10","v0.12.11","v0.12.12","v0.12.13","v0.12.14","v0.12.8","v0.12.9","v0.2.0","v0.3.0","v0.3.1","v0.3.2","v0.3.4","v0.3.5","v0.3.6","v0.3.7","v0.3.8","v0.4.0","v0.5.0","v0.5.1","v0.5.10","v0.5.2","v0.5.3","v0.5.4","v0.5.5","v0.5.5-rc1","v0.5.6","v0.5.7","v0.5.8","v0.5.9","v0.6.0","v0.6.1","v0.7.0","v0.7.2","v0.7.3","v1.0.1","v1.0.1-release","v1.0.2","v1.0.2-release","v1.0.3","v1.0.4","v1.1.0","v1.2.0","v1.3.0","v1.4.1","v1.4.2","v1.4.3","v1.5.0","v1.5.1","v1.6.0","v1.6.1","v1.6.2","v1.6.3","v1.6.4","v1.7.0","v1.7.1","v13.0.0","v13.0.1","v13.1.0","v15.0.0","v15.0.1","v15.1.0","v15.10.0","v15.2.0","v15.2.1","v15.3.0","v15.4.0","v15.5.0","v15.5.1","v15.6.0","v15.7.0","v15.8.0","v15.9.0","v2.0.0","v2.0.1","v2.0.2","v2.1.0","v2.2.0","v2.2.1","v2.3.0","v2.3.1","v2.3.2","v2.3.3","v2.3.4","v2.4.0","v2.5.0","v3.0.0","v4.0.0","v4.1.0","v4.1.1","v4.1.2","v5.0.0","v5.1.0","v5.1.1","v5.10.0","v5.10.1","v5.11.1","v5.2.0","v5.3.0","v5.4.0","v5.4.1","v5.5.0","v5.6.0","v5.7.0","v5.7.1","v5.8.0","v5.9.0","v5.9.1","v6.0.0","v6.1.0","v6.2.0","v8.0.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-1669.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"50.0.2661.87"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}