First published: Tue Mar 29 2016(Updated: )
The Program::getUniformInternal function in Program.cpp in libANGLE, as used in Google Chrome before 49.0.2623.108, does not properly handle a certain data-type mismatch, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via crafted shader stages.
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Debian GNU/Linux | =8.0 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =15.10 | |
Ubuntu Linux | =16.04 | |
openSUSE | =13.1 | |
Google Chrome | <=49.0.2623.95 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1649 is classified as a high severity vulnerability that can lead to denial of service due to buffer overflow.
To fix CVE-2016-1649, ensure that you update Google Chrome to version 49.0.2623.108 or later.
CVE-2016-1649 can allow remote attackers to cause a denial of service or potentially exploit other unspecified impacts.
CVE-2016-1649 affects specific versions of Google Chrome below 49.0.2623.108 and various Linux distributions like Debian 8.0 and Ubuntu versions 14.04, 15.10, and 16.04.
There is no official workaround for CVE-2016-1649 other than upgrading to a patched version of the affected software.