Debian Security Advisory DSA 4237-1 (chromium-browser - security update)

Published: 2018-06-29 22:00:00
CVE Author: NIST National Vulnerability Database (NVD)

CVSS Base Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N

Solution Type:
Vendor Patch

Detection Type:
Linux Distribution Package

Affected Versions:
chromium-browser on Debian Linux

Recommendations:
For the stable distribution (stretch), these problems have been fixed in version 67.0.3396.87-1~deb9u1. We recommend that you upgrade your chromium-browser Linux Distribution Packages. For the detailed security status of chromium-browser please refer to its security tracker page linked in the references.

Summary:
Several vulnerabilities have been discovered in the chromium web browser. CVE-2018-6118 Ned Williamson discovered a use-after-free issue. CVE-2018-6120 Zhou Aiting discovered a buffer overflow issue in the pdfium library. CVE-2018-6121 It was discovered that malicious extensions could escalate privileges. CVE-2018-6122 A type confusion issue was discovered in the v8 javascript library. CVE-2018-6123 Looben Yang discovered a use-after-free issue. CVE-2018-6124 Guang Gong discovered a type confusion issue. CVE-2018-6125 Yubico discovered that the WebUSB implementation was too permissive. CVE-2018-6126 Ivan Fratric discovered a buffer overflow issue in the skia library. CVE-2018-6127 Looben Yang discovered a use-after-free issue. CVE-2018-6129 Natalie Silvanovich discovered an out-of-bounds read issue in WebRTC. CVE-2018-6130 Natalie Silvanovich discovered an out-of-bounds read issue in WebRTC. CVE-2018-6131 Natalie Silvanovich discovered an error in WebAssembly. CVE-2018-6132 Ronald E. Crane discovered an uninitialized memory issue. CVE-2018-6133 Khalil Zhani discovered a URL spoofing issue. CVE-2018-6134 Jun Kokatsu discovered a way to bypass the Referrer Policy. CVE-2018-6135 Jasper Rebane discovered a user interface spoofing issue. CVE-2018-6136 Peter Wong discovered an out-of-bounds read issue in the v8 javascript library. CVE-2018-6137 Michael Smith discovered an information leak. CVE-2018-6138 Fran├žois Lajeunesse-Robert discovered that the extensions policy was too permissive. CVE-2018-6139 Rob Wu discovered a way to bypass restrictions in the debugger extension. CVE-2018-6140 Rob Wu discovered a way to bypass restrictions in the debugger extension. CVE-2018-6141 Yangkang discovered a buffer overflow issue in the skia library. CVE-2018-6142 Choongwoo Han discovered an out-of-bounds read in the v8 javascript library. CVE-2018-6143 Guang Gong discovered an out-of-bounds read in the v8 javascript library. CVE-2018-6144 pdknsk discovered an out-of-bounds read in the pdfium library. CVE-2018-6145 Masato Kinugawa discovered an error in the MathML implementation. CVE-2018-6147 Michail Pishchagin discovered an error in password entry fields. CVE-2018-6148 Micha? Bentkowski discovered that the Content Security Policy header was handled incorrectly. CVE-2018-6149 Yu Zhou and Jundong Xie discovered an out-of-bounds write issue in the v8 javascript library.

Detection Method:
This check tests the installed software version using the apt Linux Distribution Package manager.

NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database)

https://nvd.nist.gov/vuln/detail/CVE-2018-6118
https://nvd.nist.gov/vuln/detail/CVE-2018-6120
https://nvd.nist.gov/vuln/detail/CVE-2018-6121
https://nvd.nist.gov/vuln/detail/CVE-2018-6122
https://nvd.nist.gov/vuln/detail/CVE-2018-6123
https://nvd.nist.gov/vuln/detail/CVE-2018-6124
https://nvd.nist.gov/vuln/detail/CVE-2018-6125
https://nvd.nist.gov/vuln/detail/CVE-2018-6126
https://nvd.nist.gov/vuln/detail/CVE-2018-6127
https://nvd.nist.gov/vuln/detail/CVE-2018-6129
https://nvd.nist.gov/vuln/detail/CVE-2018-6130
https://nvd.nist.gov/vuln/detail/CVE-2018-6131
https://nvd.nist.gov/vuln/detail/CVE-2018-6132
https://nvd.nist.gov/vuln/detail/CVE-2018-6133
https://nvd.nist.gov/vuln/detail/CVE-2018-6134
https://nvd.nist.gov/vuln/detail/CVE-2018-6135
https://nvd.nist.gov/vuln/detail/CVE-2018-6136
https://nvd.nist.gov/vuln/detail/CVE-2018-6137
https://nvd.nist.gov/vuln/detail/CVE-2018-6138
https://nvd.nist.gov/vuln/detail/CVE-2018-6139
https://nvd.nist.gov/vuln/detail/CVE-2018-6140
https://nvd.nist.gov/vuln/detail/CVE-2018-6141
https://nvd.nist.gov/vuln/detail/CVE-2018-6142
https://nvd.nist.gov/vuln/detail/CVE-2018-6143
https://nvd.nist.gov/vuln/detail/CVE-2018-6144
https://nvd.nist.gov/vuln/detail/CVE-2018-6145
https://nvd.nist.gov/vuln/detail/CVE-2018-6147
https://nvd.nist.gov/vuln/detail/CVE-2018-6148
https://nvd.nist.gov/vuln/detail/CVE-2018-6149

References:

https://www.debian.org/security/2018/dsa-4237.html
https://security-tracker.debian.org/tracker/chromium-browser

Search
Severity
Medium
CVSS Score
5.0

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities. It is free and always will be.