{"id":"CVE-2016-1683","details":"numbers.c in libxslt before 1.1.29, as used in Google Chrome before 51.0.2704.63, mishandles namespace nodes, which allows remote attackers to cause a denial of service (out-of-bounds heap memory access) or possibly have unspecified other impact via a crafted document.","modified":"2026-04-16T12:00:07.169255Z","published":"2016-06-05T23:59:12.227Z","related":["openSUSE-SU-2024:10171-1","openSUSE-SU-2024:12948-1"],"database_specific":{"unresolved_ranges":[{"cpe":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"50.0.2661.102"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","extracted_events":[{"last_affected":"14.04"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"15.10"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","extracted_events":[{"last_affected":"16.04"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"8.0"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"42.1"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"13.2"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"12.0"}],"source":"CPE_FIELD"}]},"references":[{"type":"WEB","url":"http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html"},{"type":"WEB","url":"http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html"},{"type":"WEB","url":"http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html"},{"type":"WEB","url":"http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html"},{"type":"WEB","url":"http://lists.apple.com/archives/security-announce/2016/Jul/msg00005.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html"},{"type":"WEB","url":"http://www.securityfocus.com/bid/90876"},{"type":"WEB","url":"http://www.securityfocus.com/bid/91826"},{"type":"WEB","url":"http://www.securitytracker.com/id/1035981"},{"type":"WEB","url":"https://crbug.com/583156"},{"type":"WEB","url":"https://git.gnome.org/browse/libxslt/commit/?id=d182d8f6ba3071503d96ce17395c9d55871f0242"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SK4YNISS22MJY22YX5I6V2U63QZAUEHA/"},{"type":"WEB","url":"https://support.apple.com/HT206899"},{"type":"WEB","url":"https://support.apple.com/HT206901"},{"type":"WEB","url":"https://support.apple.com/HT206902"},{"type":"WEB","url":"https://support.apple.com/HT206903"},{"type":"WEB","url":"https://support.apple.com/HT206904"},{"type":"WEB","url":"https://support.apple.com/HT206905"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3590"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3605"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2992-1"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2016:1190"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201607-07"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1340016"},{"type":"ARTICLE","url":"http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/gnome/libxml2","events":[{"introduced":"0"},{"last_affected":"2189b59b1005976970ebadb65edbb289f9e091ff"}],"database_specific":{"cpe":["cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"],"extracted_events":[{"introduced":"0"},{"last_affected":"6.0"}],"source":"CPE_FIELD"}}],"versions":["EAZEL-NAUTILUS-MS-AUG07","FOR_GNOME_0_99_1","GNOME_0_30","GNOME_PRINT_0_24","GNUMERIC_FIRST_PUBLIC_RELEASE","LIBXML2_2_4_21","LIBXML2_2_5_0","LIBXML2_2_5_10","LIBXML2_2_5_7","LIBXML2_2_5_8","LIBXML2_2_5_9","LIBXML2_2_5_x","LIBXML2_6_0","LIBXML_0_99","LIBXML_1_5_0","LIBXML_1_8_5","LIBXML_1_8_6","LIBXML_2_0_0","LIBXML_2_1_0","LIBXML_2_1_1","LIBXML_2_2_1","LIBXML_2_2_3","LIBXML_2_2_4","LIBXML_2_2_6","LIBXML_2_2_7","LIBXML_2_2_8","LIBXML_2_3_0","LIBXML_2_3_10","LIBXML_2_3_11","LIBXML_2_3_12","LIBXML_2_3_13","LIBXML_2_3_14","LIBXML_2_3_2","LIBXML_2_3_3","LIBXML_2_3_4","LIBXML_2_3_5","LIBXML_2_3_6","LIBXML_2_3_7","LIBXML_2_3_8","LIBXML_2_3_9","LIBXML_2_4_0","LIBXML_2_4_11","LIBXML_2_4_12","LIBXML_2_4_13","LIBXML_2_4_14","LIBXML_2_4_16","LIBXML_2_4_18","LIBXML_2_4_2","LIBXML_2_4_20","LIBXML_2_4_22","LIBXML_2_4_23","LIBXML_2_4_24","LIBXML_2_4_25","LIBXML_2_4_26","LIBXML_2_4_27","LIBXML_2_4_29","LIBXML_2_4_3","LIBXML_2_4_30","LIBXML_2_4_4","LIBXML_2_4_6","LIBXML_2_4_7","LIBXML_2_5_1","LIBXML_2_5_2","LIBXML_2_5_3","LIBXML_2_5_4","LIBXML_2_5_5","LIBXML_2_5_6","LIBXML_TEST_2_0_0","LIB_XML_1_1","LIB_XML_1_3","LIB_XML_1_4","LIB_XML_1_6_1","LIB_XML_1_6_2","LIB_XML_1_7_0","LIB_XML_1_7_1","LIB_XML_1_7_3","LIB_XML_1_8_3","LIB_XML_1_X","PRE_MUCKUP","PRE_MUCKUP2","PRE_MUCKUP3","help"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-1683.json"}},{"ranges":[{"type":"GIT","repo":"https://gitlab.gnome.org/GNOME/libxslt","events":[{"introduced":"0"},{"last_affected":"195f644cf7b5e93208b033fa7c5501c41cf82f59"}],"database_specific":{"cpe":"cpe:2.3:a:xmlsoft:libxslt:*:*:*:*:*:*:*:*","extracted_events":[{"introduced":"0"},{"last_affected":"1.1.28"}],"source":"CPE_FIELD"}}],"versions":["1.1.23","1.1.24","LIBXSLT_0_0_0","LIBXSLT_0_10_0","LIBXSLT_0_11_0","LIBXSLT_0_12_0","LIBXSLT_0_13_0","LIBXSLT_0_14_0","LIBXSLT_0_1_0","LIBXSLT_0_3_0","LIBXSLT_0_4_0","LIBXSLT_0_6_0","LIBXSLT_0_7_0","LIBXSLT_0_8_0","LIBXSLT_0_9_0","LIBXSLT_1_0_0","LIBXSLT_1_0_10","LIBXSLT_1_0_11","LIBXSLT_1_0_12","LIBXSLT_1_0_13","LIBXSLT_1_0_14","LIBXSLT_1_0_16","LIBXSLT_1_0_17","LIBXSLT_1_0_18","LIBXSLT_1_0_19","LIBXSLT_1_0_2","LIBXSLT_1_0_20","LIBXSLT_1_0_21","LIBXSLT_1_0_22","LIBXSLT_1_0_23","LIBXSLT_1_0_24","LIBXSLT_1_0_25","LIBXSLT_1_0_26","LIBXSLT_1_0_27","LIBXSLT_1_0_28","LIBXSLT_1_0_29","LIBXSLT_1_0_3","LIBXSLT_1_0_30","LIBXSLT_1_0_31","LIBXSLT_1_0_32","LIBXSLT_1_0_33","LIBXSLT_1_0_4","LIBXSLT_1_0_5","LIBXSLT_1_0_6","LIBXSLT_1_0_7","LIBXSLT_1_0_8","LIBXSLT_1_0_9","LIBXSLT_1_1_0","LIBXSLT_1_1_1","LIBXSLT_1_1_10","LIBXSLT_1_1_11","LIBXSLT_1_1_12","LIBXSLT_1_1_13","LIBXSLT_1_1_14","LIBXSLT_1_1_15","LIBXSLT_1_1_16","LIBXSLT_1_1_17","LIBXSLT_1_1_18","LIBXSLT_1_1_2","LIBXSLT_1_1_21","LIBXSLT_1_1_22","LIBXSLT_1_1_3","LIBXSLT_1_1_4","LIBXSLT_1_1_5","LIBXSLT_1_1_6","LIBXSLT_1_1_7","LIBXSLT_1_1_8","LIBXSLT_1_1_9","LIXSLT_0_5_0","v1.1.25","v1.1.26","v1.1.27","v1.1.27-rc1","v1.1.28"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-1683.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}