First published: Fri Mar 30 2018(Updated: )
A double-eviction in the Incognito mode cache that lead to a user-after-free in Networking Disk Cache in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to execute arbitrary code via a crafted HTML page.
Credit: Ned Williamson cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/chromium-browser | <66.0.3359.117 | 66.0.3359.117 |
debian/chromium-browser | ||
Google Chrome | <66.0.3359.117 | |
Redhat Linux Desktop | =6.0 | |
Redhat Linux Server | =6.0 | |
Redhat Linux Workstation | =6.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Google Chrome | <66.0.3359.117 | 66.0.3359.117 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The severity of CVE-2018-6086 is high (8.8).
CVE-2018-6086 affects Google Chrome versions prior to 66.0.3359.117.
A remote attacker can exploit CVE-2018-6086 by crafting a malicious HTML page.
There is no specific remedy for CVE-2018-6086 in Redhat Linux Server 6.0 as it is not affected.
More information about CVE-2018-6086 can be found at the following references: [1](http://www.securityfocus.com/bid/103917), [2](https://access.redhat.com/errata/RHSA-2018:1195), [3](https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html).