First published: Sun Dec 03 2017(Updated: )
A cross origin information leak flaw was found in the Blink component of the Chromium browser. Upstream bug(s): <a href="https://code.google.com/p/chromium/issues/detail?id=791324">https://code.google.com/p/chromium/issues/detail?id=791324</a> External References: <a href="https://chromereleases.googleblog.com/2018/07/stable-channel-update-for-desktop.html">https://chromereleases.googleblog.com/2018/07/stable-channel-update-for-desktop.html</a>
Credit: an anonymous researcher AhsanEjaz - @AhsanEjazA product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/chromium-browser | <68.0.3440.75 | 68.0.3440.75 |
debian/webkit2gtk | 2.44.2-1~deb11u1 2.44.3-1~deb11u1 2.44.2-1~deb12u1 2.44.3-1~deb12u1 2.46.0-2 2.46.1-1 | |
Google Chrome | <68.0.3440.75 | 68.0.3440.75 |
Apple Mobile Safari | <11.1 | 11.1 |
Apple iOS, iPadOS, and watchOS | <11.3 | 11.3 |
Apple iOS, iPadOS, and watchOS | <4.3 | 4.3 |
Apple iCloud | <7.4 | 7.4 |
Apple Mobile Safari | <11.1 | |
iStyle @cosme iPhone OS | <11.3 | |
Apple iOS, iPadOS, and watchOS | <4.3 | |
All of | ||
Apple iCloud for Windows | <7.4 | |
Microsoft Windows | ||
All of | ||
Apple iTunes for Windows | <12.7.4 | |
Microsoft Windows | ||
WebKitGTK+ | <2.20.4 | |
Ubuntu | =16.04 | |
Ubuntu | =17.10 | |
Debian | =9.0 | |
redhat enterprise Linux desktop | =6.0 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux workstation | =6.0 | |
Apple iCloud for Windows | <7.4 | |
Microsoft Windows | ||
Apple iTunes for Windows | <12.7.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
Vulnerability CVE-2018-4117 is a cross-origin issue in the fetch API component of WebKit.
iOS before 11.3, Safari before 11.1, iCloud before 7.4 on Windows, iTunes before 12.7.4 on Windows, and watchOS before 4.3 are affected.
CVE-2018-4117 has a severity rating of 6.5 (medium).
To fix CVE-2018-4117, it is recommended to update to the latest available version of the affected software.
You can find more information about CVE-2018-4117 on the following websites: securityfocus.com, securitytracker.com, and access.redhat.com.