First published: Wed Mar 07 2018(Updated: )
A stack buffer overflow flaw was found in the Skia component of the Chromium browser. Upstream bug(s): <a href="https://code.google.com/p/chromium/issues/detail?id=799918">https://code.google.com/p/chromium/issues/detail?id=799918</a> External References: <a href="https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html">https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html</a>
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Chrome | <65.0.3325.146 | |
Redhat Linux Desktop | =6.0 | |
Redhat Linux Server | =6.0 | |
Redhat Linux Workstation | =6.0 | |
Debian Debian Linux | =9.0 | |
debian/chromium-browser |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-6069 is a stack buffer overflow vulnerability in Skia in Google Chrome prior to version 65.0.3325.146.
CVE-2018-6069 allows a remote attacker to perform an out of bounds memory read via a crafted HTML page.
CVE-2018-6069 affects Google Chrome versions prior to 65.0.3325.146 on Debian and Redhat Linux.
CVE-2018-6069 has a severity rating of 6.5 (Medium).
To fix CVE-2018-6069, update Google Chrome to version 65.0.3325.146 or later.