{"id":"CVE-2023-1534","details":"Out of bounds read in ANGLE in Google Chrome prior to 111.0.5563.110 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","modified":"2026-03-15T22:45:44.843105Z","published":"2023-03-21T21:15:12.747Z","related":["openSUSE-SU-2023:0082-1","openSUSE-SU-2023:0114-1","openSUSE-SU-2023:0115-1","openSUSE-SU-2024:12811-1","openSUSE-SU-2024:12829-1","openSUSE-SU-2024:12948-1","openSUSE-SU-2024:12963-1"],"references":[{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202309-17"},{"type":"ADVISORY","url":"http://packetstormsecurity.com/files/171961/Chrome-GL_ShaderBinary-Untrusted-Process-Exposure.html"},{"type":"ADVISORY","url":"http://packetstormsecurity.com/files/171965/Chrome-SpvGetMappedSamplerName-Out-Of-Bounds-String-Copy.html"},{"type":"ADVISORY","url":"https://chromereleases.googleblog.com/2023/03/stable-channel-update-for-desktop_21.html"},{"type":"REPORT","url":"https://crbug.com/1422594"},{"type":"ARTICLE","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/"},{"type":"ARTICLE","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NGWWGQULJ7QRNP4GY57HE7OO7VMRWMPN/"},{"type":"ARTICLE","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"111.0.5563.110"}]},{"events":[{"introduced":"0"},{"last_affected":"36"}]},{"events":[{"introduced":"0"},{"last_affected":"37"}]},{"events":[{"introduced":"0"},{"last_affected":"38"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-1534.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}