{"id":"CVE-2016-1678","details":"objects.cc in Google V8 before 5.0.71.32, as used in Google Chrome before 51.0.2704.63, does not properly restrict lazy deoptimization, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted JavaScript code.","modified":"2026-04-10T03:50:30.963169Z","published":"2016-06-05T23:59:06.880Z","related":["MGASA-2016-0214","openSUSE-SU-2024:10171-1","openSUSE-SU-2024:12948-1"],"references":[{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html"},{"type":"WEB","url":"https://crbug.com/595259"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html"},{"type":"WEB","url":"http://www.securityfocus.com/bid/90876"},{"type":"WEB","url":"http://www.securitytracker.com/id/1035981"},{"type":"WEB","url":"https://codereview.chromium.org/1875053002"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2992-1"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2016:1190"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201607-07"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3590"},{"type":"ARTICLE","url":"http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/v8/v8","events":[{"introduced":"0"},{"last_affected":"ad16e6c2cbd2c6b0f2e8ff944ac245561c682ac2"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"5.0.71"}]}}],"versions":["3.21.18","3.26.30","3.28.33","3.28.34","3.28.36","3.28.37","3.28.39","3.28.40","3.28.41","3.28.42","3.28.44","3.28.46","3.28.47","3.28.49","3.28.55","3.28.56","3.28.58","3.28.61","3.28.63","3.28.66","3.28.67","3.28.68","3.28.70","3.28.72","3.29.1","3.29.12","3.29.13","3.29.15","3.29.18","3.29.19","3.29.2","3.29.21","3.29.22","3.29.26","3.29.28","3.29.3","3.29.30","3.29.31","3.29.32","3.29.33","3.29.34","3.29.36","3.29.37","3.29.39","3.29.4","3.29.42","3.29.44","3.29.45","3.29.46","3.29.47","3.29.48","3.29.49","3.29.5","3.29.51","3.29.52","3.29.54","3.29.55","3.29.56","3.29.58","3.29.6","3.29.60","3.29.61","3.29.62","3.29.63","3.29.65","3.29.67","3.29.68","3.29.69","3.29.7","3.29.71","3.29.72","3.29.73","3.29.76","3.29.77","3.29.79","3.29.8","3.29.80","3.29.85","3.29.86","5.0.71"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"50.0.2661.102"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"15.10"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"42.1"}]},{"events":[{"introduced":"0"},{"last_affected":"13.2"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-1678.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}