First published: Wed Mar 07 2018(Updated: )
An integer overflow flaw was found in the V8 component of the Chromium browser. Upstream bug(s): <a href="https://code.google.com/p/chromium/issues/detail?id=808192">https://code.google.com/p/chromium/issues/detail?id=808192</a> External References: <a href="https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html">https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html</a>
Credit: cve-coordination@google.com chrome-cve-admin@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/chromium-browser | ||
debian/libv8 | ||
Google Chrome | <65.0.3325.146 | |
Redhat Enterprise Linux Desktop | =6.0 | |
Redhat Enterprise Linux Server | =6.0 | |
Redhat Enterprise Linux Workstation | =6.0 | |
Debian Debian Linux | =9.0 | |
mi Mi6 Browser | ||
redhat/chromium-browser | <65.0.3325.146 | 65.0.3325.146 |
Xiaomi Browser | ||
Google Chromium V8 | ||
<65.0.3325.146 | ||
=6.0 | ||
=6.0 | ||
=6.0 | ||
=9.0 | ||
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2018-6065.
The affected software for this vulnerability includes Google Chromium V8 Engine, Chromium Browser, libv8, Google Chrome, Redhat Enterprise Linux Desktop, Redhat Enterprise Linux Server, Redhat Enterprise Linux Workstation, Debian Debian Linux, and Xiaomi Browser.
This vulnerability can be exploited by remote attackers who can execute arbitrary code on vulnerable installations of Xiaomi Mi6 Browser through user interaction, such as visiting a malicious page or opening a malicious file.
CVE-2018-6065 has a severity rating of 8.8 (High).
More information about this vulnerability can be found in the references: [Google Code](https://code.google.com/p/chromium/issues/detail?id=808192), [Chrome Releases](https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html), and [Red Hat Bugzilla](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1552502).