exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Debian Security Advisory 4182-1

Debian Security Advisory 4182-1
Posted Apr 28, 2018
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4182-1 - Several vulnerabilities have been discovered in the chromium web browser.

tags | advisory, web, vulnerability
systems | linux, debian
advisories | CVE-2018-6056, CVE-2018-6057, CVE-2018-6060, CVE-2018-6061, CVE-2018-6062, CVE-2018-6063, CVE-2018-6064, CVE-2018-6065, CVE-2018-6066, CVE-2018-6067, CVE-2018-6068, CVE-2018-6069, CVE-2018-6070, CVE-2018-6071, CVE-2018-6072, CVE-2018-6073, CVE-2018-6074, CVE-2018-6075, CVE-2018-6076, CVE-2018-6077, CVE-2018-6078, CVE-2018-6079, CVE-2018-6080, CVE-2018-6081, CVE-2018-6082, CVE-2018-6083, CVE-2018-6085, CVE-2018-6086
SHA-256 | bf467922f499761124cd3e7e1500636dd40ac227780bc16080c337465230a2ad

Debian Security Advisory 4182-1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4182-1 security@debian.org
https://www.debian.org/security/ Michael Gilbert
April 28, 2018 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : chromium-browser
CVE ID : CVE-2018-6056 CVE-2018-6057 CVE-2018-6060 CVE-2018-6061
CVE-2018-6062 CVE-2018-6063 CVE-2018-6064 CVE-2018-6065
CVE-2018-6066 CVE-2018-6067 CVE-2018-6068 CVE-2018-6069
CVE-2018-6070 CVE-2018-6071 CVE-2018-6072 CVE-2018-6073
CVE-2018-6074 CVE-2018-6075 CVE-2018-6076 CVE-2018-6077
CVE-2018-6078 CVE-2018-6079 CVE-2018-6080 CVE-2018-6081
CVE-2018-6082 CVE-2018-6083 CVE-2018-6085 CVE-2018-6086
CVE-2018-6087 CVE-2018-6088 CVE-2018-6089 CVE-2018-6090
CVE-2018-6091 CVE-2018-6092 CVE-2018-6093 CVE-2018-6094
CVE-2018-6095 CVE-2018-6096 CVE-2018-6097 CVE-2018-6098
CVE-2018-6099 CVE-2018-6100 CVE-2018-6101 CVE-2018-6102
CVE-2018-6103 CVE-2018-6104 CVE-2018-6105 CVE-2018-6106
CVE-2018-6107 CVE-2018-6108 CVE-2018-6109 CVE-2018-6110
CVE-2018-6111 CVE-2018-6112 CVE-2018-6113 CVE-2018-6114
CVE-2018-6116 CVE-2018-6117

Several vulnerabilities have been discovered in the chromium web browser.

CVE-2018-6056

lokihardt discovered an error in the v8 javascript library.

CVE-2018-6057

Gal Beniamini discovered errors related to shared memory permissions.

CVE-2018-6060

Omair discovered a use-after-free issue in blink/webkit.

CVE-2018-6061

Guang Gong discovered a race condition in the v8 javascript library.

CVE-2018-6062

A heap overflow issue was discovered in the v8 javascript library.

CVE-2018-6063

Gal Beniamini discovered errors related to shared memory permissions.

CVE-2018-6064

lokihardt discovered a type confusion error in the v8 javascript
library.

CVE-2018-6065

Mark Brand discovered an integer overflow issue in the v8 javascript
library.

CVE-2018-6066

Masato Kinugawa discovered a way to bypass the Same Origin Policy.

CVE-2018-6067

Ned Williamson discovered a buffer overflow issue in the skia library.

CVE-2018-6068

Luan Herrera discovered object lifecycle issues.

CVE-2018-6069

Wanglu and Yangkang discovered a stack overflow issue in the skia
library.

CVE-2018-6070

Rob Wu discovered a way to bypass the Content Security Policy.

CVE-2018-6071

A heap overflow issue was discovered in the skia library.

CVE-2018-6072

Atte Kettunen discovered an integer overflow issue in the pdfium
library.

CVE-2018-6073

Omair discover a heap overflow issue in the WebGL implementation.

CVE-2018-6074

Abdulrahman Alqabandi discovered a way to cause a downloaded web page
to not contain a Mark of the Web.

CVE-2018-6075

Inti De Ceukelaire discovered a way to bypass the Same Origin Policy.

CVE-2018-6076

Mateusz Krzeszowiec discovered that URL fragment identifiers could be
handled incorrectly.

CVE-2018-6077

Khalil Zhani discovered a timing issue.

CVE-2018-6078

Khalil Zhani discovered a URL spoofing issue.

CVE-2018-6079

Ivars discovered an information disclosure issue.

CVE-2018-6080

Gal Beniamini discovered an information disclosure issue.

CVE-2018-6081

Rob Wu discovered a cross-site scripting issue.

CVE-2018-6082

WenXu Wu discovered a way to bypass blocked ports.

CVE-2018-6083

Jun Kokatsu discovered that AppManifests could be handled incorrectly.

CVE-2018-6085

Ned Williamson discovered a use-after-free issue.

CVE-2018-6086

Ned Williamson discovered a use-after-free issue.

CVE-2018-6087

A use-after-free issue was discovered in the WebAssembly implementation.

CVE-2018-6088

A use-after-free issue was discovered in the pdfium library.

CVE-2018-6089

Rob Wu discovered a way to bypass the Same Origin Policy.

CVE-2018-6090

ZhanJia Song discovered a heap overflow issue in the skia library.

CVE-2018-6091

Jun Kokatsu discovered that plugins could be handled incorrectly.

CVE-2018-6092

Natalie Silvanovich discovered an integer overflow issue in the
WebAssembly implementation.

CVE-2018-6093

Jun Kokatsu discovered a way to bypass the Same Origin Policy.

CVE-2018-6094

Chris Rohlf discovered a regression in garbage collection hardening.

CVE-2018-6095

Abdulrahman Alqabandi discovered files could be uploaded without user
interaction.

CVE-2018-6096

WenXu Wu discovered a user interface spoofing issue.

CVE-2018-6097

xisigr discovered a user interface spoofing issue.

CVE-2018-6098

Khalil Zhani discovered a URL spoofing issue.

CVE-2018-6099

Jun Kokatsu discovered a way to bypass the Cross Origin Resource
Sharing mechanism.

CVE-2018-6100

Lnyas Zhang dsicovered a URL spoofing issue.

CVE-2018-6101

Rob Wu discovered an issue in the developer tools remote debugging
protocol.

CVE-2018-6102

Khalil Zhani discovered a URL spoofing issue.

CVE-2018-6103

Khalil Zhani discovered a user interface spoofing issue.

CVE-2018-6104

Khalil Zhani discovered a URL spoofing issue.

CVE-2018-6105

Khalil Zhani discovered a URL spoofing issue.

CVE-2018-6106

lokihardt discovered that v8 promises could be handled incorrectly.

CVE-2018-6107

Khalil Zhani discovered a URL spoofing issue.

CVE-2018-6108

Khalil Zhani discovered a URL spoofing issue.

CVE-2018-6109

Dominik Weber discovered a way to misuse the FileAPI feature.

CVE-2018-6110

Wenxiang Qian discovered that local plain text files could be handled
incorrectly.

CVE-2018-6111

Khalil Zhani discovered a use-after-free issue in the developer tools.

CVE-2018-6112

Khalil Zhani discovered incorrect handling of URLs in the developer
tools.

CVE-2018-6113

Khalil Zhani discovered a URL spoofing issue.

CVE-2018-6114

Lnyas Zhang discovered a way to bypass the Content Security Policy.

CVE-2018-6116

Chengdu Security Response Center discovered an error when memory
is low.

CVE-2018-6117

Spencer Dailey discovered an error in form autofill settings.

For the oldstable distribution (jessie), security support for chromium
has been discontinued.

For the stable distribution (stretch), these problems have been fixed in
version 66.0.3359.117-1~deb9u1.

We recommend that you upgrade your chromium-browser packages.

For the detailed security status of chromium-browser please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/chromium-browser

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
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=kD3V
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close