First published: Wed May 09 2018(Updated: )
A lack of limits on update() flaw was found in the ServiceWorker component of the Chromium browser. Upstream bug(s): <a href="https://code.google.com/p/chromium/issues/detail?id=805496">https://code.google.com/p/chromium/issues/detail?id=805496</a> External References: <a href="https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html">https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html</a>
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | <60 | 60 |
<60 | 60 | |
redhat/chromium-browser | <70.0.3538.67 | 70.0.3538.67 |
Mozilla Firefox | <60.0 | |
debian/chromium-browser |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2018-5179 is a vulnerability that allows a service worker to send the "activate" event on itself periodically, allowing it to run perpetually and potentially perform malicious activity in the background.
The affected software includes Mozilla Firefox version up to exclusive 60, and Chromium Browser version up to exclusive 70.0.3538.67.
CVE-2018-5179 has a severity rating of high (7.5).
To fix CVE-2018-5179 in Mozilla Firefox, update to a version higher than 60.0.
To fix CVE-2018-5179 in Chromium Browser, update to a version higher than 70.0.3538.67.