First published: Wed Mar 07 2018(Updated: )
An incorrect handling of url fragment identifiers flaw was found in the Blink component of the Chromium browser. Upstream bug(s): <a href="https://code.google.com/p/chromium/issues/detail?id=758523">https://code.google.com/p/chromium/issues/detail?id=758523</a> External References: <a href="https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html">https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html</a>
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/chromium-browser | <65.0.3325.146 | 65.0.3325.146 |
Google Chrome | <65.0.3325.146 | |
Redhat Linux Desktop | =6.0 | |
Redhat Linux Server | =6.0 | |
Redhat Linux Workstation | =6.0 | |
Debian Debian Linux | =9.0 | |
debian/chromium-browser |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-6076 is medium, with a severity value of 6.1.
CVE-2018-6076 affects Google Chrome versions prior to 65.0.3325.146.
A remote attacker can exploit CVE-2018-6076 by performing a DOM based XSS attack via a crafted HTML page.
There is no specific remedy mentioned for CVE-2018-6076.
You can find more information about CVE-2018-6076 at the following references: [1](https://security-tracker.debian.org/tracker/CVE-2018-6076), [2](https://code.google.com/p/chromium/issues/detail?id=758523), [3](https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html)