Name | CVE-2018-6033 |
Description | Insufficient data validation in Downloads in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to potentially run arbitrary code outside sandbox via a crafted Chrome Extension. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more) |
References | DSA-4103-1 |
NVD severity | medium (attack range: remote) |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
chromium-browser (PTS) | jessie (security), jessie | 57.0.2987.98-1~deb8u1 | vulnerable |
stretch | 70.0.3538.110-1~deb9u1 | fixed | |
stretch (security) | 71.0.3578.80-1~deb9u1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
chromium-browser | source | (unstable) | 64.0.3282.119-1 | medium | ||
chromium-browser | source | jessie | (unfixed) | end-of-life | ||
chromium-browser | source | stretch | 64.0.3282.119-1~deb9u1 | medium | DSA-4103-1 | |
chromium-browser | source | wheezy | (unfixed) | end-of-life |
[jessie] - chromium-browser <end-of-life> (End of life, see DSA 4020)
[wheezy] - chromium-browser <end-of-life> (Not supported in Wheezy)