First published: Sun Feb 11 2018(Updated: )
An url spoof flaw was found in the Omnibox component of the Chromium browser. Upstream bug(s): <a href="https://code.google.com/p/chromium/issues/detail?id=811117">https://code.google.com/p/chromium/issues/detail?id=811117</a> External References: <a href="https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html">https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html</a>
Credit: Lnyas Zhang cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/chromium-browser | ||
redhat/chromium-browser | <66.0.3359.117 | 66.0.3359.117 |
Google Chrome (Trace Event) | <66.0.3359.117 | 66.0.3359.117 |
Google Chrome | <66.0.3359.117 | |
Apple iOS and macOS | ||
Debian Linux | =8.0 | |
Debian Linux | =9.0 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Workstation | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2018-6100 is classified with a high severity due to its potential for misleading users via URL spoofing.
To mitigate CVE-2018-6100, update your Chromium browser to version 66.0.3359.117 or later.
CVE-2018-6100 affects the Omnibox component of the Chromium browser.
CVE-2018-6100 affects Chrome versions prior to 66.0.3359.117.
CVE-2018-6100 affects Chromium and Chrome across different operating systems, including Linux and Windows.