SB2018052809 - SUSE Linux update for chromium 



SB2018052809 - SUSE Linux update for chromium

Published: May 28, 2018 Updated: July 1, 2021

Security Bulletin ID SB2018052809
Severity
High
Patch available
YES
Number of vulnerabilities 64
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 30% Medium 11% Low 59%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 64 secuirty vulnerabilities.


1) Use-after-free error (CVE-ID: CVE-2017-11215)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to a use-after-free error. A remote attacker can trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability may result in system compromise.


2) Use-after-free error (CVE-ID: CVE-2017-11225)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to a use-after-free error. A remote attacker can trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability may result in system compromise.


3) Memory corruption (CVE-ID: CVE-2018-6057)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to incorrect permissions on shared memory. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.

Successful exploitation of the vulnerability may result in system compromise.

4) Use-after-free error (CVE-ID: CVE-2018-6060)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to use-after-free error in Blink. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.

Successful exploitation of the vulnerability may result in system compromise.

5) Race condition (CVE-ID: CVE-2018-6061)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to race condition in V8. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.

Successful exploitation of the vulnerability may result in system compromise.

6) Heap-based buffer overflow (CVE-ID: CVE-2018-6062)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to heap-based buffer overflow in Skia. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.

Successful exploitation of the vulnerability may result in system compromise.

7) Memory corruption (CVE-ID: CVE-2018-6063)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to incorrect permissions on shared memory. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.

Successful exploitation of the vulnerability may result in system compromise.

8) Type confusion (CVE-ID: CVE-2018-6064)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to type confusion in V8. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.

Successful exploitation of the vulnerability may result in system compromise.

9) Integer overflow (CVE-ID: CVE-2018-6065)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to integer overflow. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code.

Successful exploitation of the vulnerability may result in system compromise.

10) Security restrictions bypass (CVE-ID: CVE-2018-6066)

The vulnerability allows a remote attacker to bypass security restrictions on the target system.

The weakness exists due to same origin bypass via canvas. A remote attacker can trick the victim into visiting a specially crafted website and bypass security restrictions.

11) Buffer overflow (CVE-ID: CVE-2018-6067)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists in Skia due to buffer overflow. A remote attacker can trigger memory corruption and cause the service to crash.

12) Improper resource shutdown (CVE-ID: CVE-2018-6068)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to object lifetime issues. A remote attacker can cause the service to crash.

13) Stack-based buffer overflow (CVE-ID: CVE-2018-6069)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists in Skia due to stack-based buffer overflow. A remote attacker can trigger memory corruption and cause the service to crash.

14) Improper access control (CVE-ID: CVE-2018-6070)

The vulnerability allows a remote attacker to bypass security restrictions on the target system.

The weakness exists due to CSP bypass through extensions. A remote attacker can bypass security restrictions.

15) Heap-based buffer overflow (CVE-ID: CVE-2018-6071)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists in Skia due to heap-based buffer overflow. A remote attacker can trigger memory corruption and cause the service to crash.

16) Integer overflow (CVE-ID: CVE-2018-6072)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists in PDFium due to integer overflow. A remote attacker can trigger buffer overflow and cause the service to crash.

17) Heap-based buffer overflow (CVE-ID: CVE-2018-6073)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists in WebGL due to heap-based buffer overflow. A remote attacker can trigger memory corruption and cause the service to crash.

18) Improper access control (CVE-ID: CVE-2018-6074)

The vulnerability allows a remote attacker to bypass security restrictions on the target system.

The weakness exists due to Mark-of-the-Web bypass. A remote attacker can bypass security restrictions.

19) Security restrictions bypass (CVE-ID: CVE-2018-6075)

The vulnerability allows a remote attacker to bypass security restrictions on the target system.

The weakness exists due to overly permissive cross origin downloads. A remote attacker can bypass security restrictions.

20) Data handling (CVE-ID: CVE-2018-6076)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists in Blink due to incorrect handling of URL fragment identifiers. A remote attacker can cause the service to crash.

21) Timing attack (CVE-ID: CVE-2018-6077)

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The weakness exists in SVG filters due to covert timing channel. A remote attacker can gain access to potentially sensitive information.

22) Spoofing attack (CVE-ID: CVE-2018-6078)

The vulnerability allows a remote attacker to conduct spoofing attack on the target system.

The weakness exists in OmniBox due to URL spoof. A remote attacker can perform spoofing attack and obtain arbitrary data.

23) Information disclosure (CVE-ID: CVE-2018-6079)

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The weakness exists in WebGL due to improper information control via texture data. A remote attacker can gain access to potentially sensitive information.

24) Information disclosure (CVE-ID: CVE-2018-6080)

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The weakness exists in IPC call due to improper information control. A remote attacker can gain access to potentially sensitive information.

25) Cross-site scripting (CVE-ID: CVE-2018-6081)

The vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The weakness exists in interstitials due to insufficient sanitization of user-supplied data. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.


26) Security restrictions bypass (CVE-ID: CVE-2018-6082)

The vulnerability allows a remote attacker to bypass security restrictions on the target system.

The weakness exists due to circumvention of port blocking. A remote attacker can bypass security restrictions.

27) Improper access control (CVE-ID: CVE-2018-6083)

The vulnerability allows a remote attacker to bypass security restrictions on the target system.

The weakness exists due to incorrect processing of AppManifests. A remote attacker can bypass security restrictions.

28) Use-after-free error (CVE-ID: CVE-2018-6085)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to use-after-free in Disk Cache. A remote unauthenticated attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


29) Use-after-free error (CVE-ID: CVE-2018-6086)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to use-after-free in Disk Cache. A remote unauthenticated attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


30) Use-after-free error (CVE-ID: CVE-2018-6087)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to use-after-free in WebAssembly. A remote unauthenticated attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


31) Use-after-free error (CVE-ID: CVE-2018-6088)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to use-after-free in PDFium. A remote unauthenticated attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


32) Security restrictions bypass (CVE-ID: CVE-2018-6089)

The vulnerability allows a remote attacker to bypass security restrictions.

The vulnerability exists due to an error in Service Worker. A remote unauthenticated attacker can trick the victim into visiting a specially crafted website, bypass security restrictions and gain unauthorized access to the system.


33) Heap-based buffer overflow (CVE-ID: CVE-2018-6090)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to heap-based buffer overflow in Skia. A remote unauthenticated attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


34) Security restrictions bypass (CVE-ID: CVE-2018-6091)

The vulnerability allows a remote attacker to bypass security restrictions.

The vulnerability exists due to the incorrect handling of plug-ins by Service Worker. A remote unauthenticated attacker can trick the victim into visiting a specially crafted website, bypass same origin policy restrictions and gain unauthorized access to the system.


35) Integer overflow (CVE-ID: CVE-2018-6092)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow in WebAssembly. A remote unauthenticated attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


36) Security restrictions bypass (CVE-ID: CVE-2018-6093)

The vulnerability allows a remote attacker to bypass security restrictions.

The vulnerability exists due to an error in Service Worker. A remote unauthenticated attacker can trick the victim into visiting a specially crafted website, bypass same origin restrictions and gain unauthorized access to the system.


37) Security restrictions bypass (CVE-ID: CVE-2018-6094)

The vulnerability allows a remote attacker to bypass security restrictions.

The vulnerability exists due to exploit hardening regression in Oilpan. A remote unauthenticated attacker can trick the victim into visiting a specially crafted website, bypass security restrictions and gain unauthorized access to the system.


38) Security restrictions bypass (CVE-ID: CVE-2018-6095)

The vulnerability allows a remote attacker to bypass security restrictions.

The vulnerability exists due to the lack of meaningful user interaction requirement before file upload. A remote unauthenticated attacker can trick the victim into visiting a specially crafted website, bypass security restrictions and gain unauthorized access to the system.


39) Spoofing attack (CVE-ID: CVE-2018-6096)

The vulnerability allows a remote attacker to perform spoofing attack.

The vulnerability exists due to unspecified error. A remote attacker can trick the victim into visiting a specially crafted website and conduct spoof the Fullscreen UI.


40) Spoofing attack (CVE-ID: CVE-2018-6097)

The vulnerability allows a remote attacker to perform spoofing attack.

The vulnerability exists due to unspecified error. A remote attacker can trick the victim into visiting a specially crafted website and conduct spoof the Fullscreen UI.


41) Spoofing attack (CVE-ID: CVE-2018-6098)

The vulnerability allows a remote attacker to perform spoofing attack.

The vulnerability exists due to an error in OmniBox. A remote attacker can trick the victim into visiting a specially crafted website and conduct URL spoofing attacks.


42) Security restrictions bypass (CVE-ID: CVE-2018-6099)

The vulnerability allows a remote attacker to bypass security restrictions.

The vulnerability exists due to an error in Service Worker. A remote unauthenticated attacker can trick the victim into visiting a specially crafted website, bypass CORS and gain unauthorized access to the system.


43) Spoofing attack (CVE-ID: CVE-2018-6100)

The vulnerability allows a remote attacker to perform spoofing attack.

The vulnerability exists due to an error in OmniBox. A remote attacker can trick the victim into visiting a specially crafted website and conduct URL spoofing attacks.


44) Security restrictions bypass (CVE-ID: CVE-2018-6101)

The vulnerability allows a remote attacker to bypass security restrictions.

The vulnerability exists due to insufficient protection of remote debugging prototol in DevTools. A remote unauthenticated attacker can trick the victim into visiting a specially crafted website, bypass security restrictions and gain unauthorized access to the system.


45) Spoofing attack (CVE-ID: CVE-2018-6102)

The vulnerability allows a remote attacker to perform spoofing attack.

The vulnerability exists due to an error in OmniBox. A remote attacker can trick the victim into visiting a specially crafted website and conduct URL spoofing attacks.


46) Spoofing attack (CVE-ID: CVE-2018-6103)

The vulnerability allows a remote attacker to perform spoofing attack.

The vulnerability exists due to an error in Permissions. A remote attacker can trick the victim into visiting a specially crafted website and conduct URL spoofing attacks.


47) Spoofing attack (CVE-ID: CVE-2018-6104)

The vulnerability allows a remote attacker to perform spoofing attack.

The vulnerability exists due to an error in OmniBox. A remote attacker can trick the victim into visiting a specially crafted website and conduct URL spoofing attacks.


48) Spoofing attack (CVE-ID: CVE-2018-6105)

The vulnerability allows a remote attacker to perform spoofing attack.

The vulnerability exists due to an error in OmniBox. A remote attacker can trick the victim into visiting a specially crafted website and conduct URL spoofing attacks.


49) Security restrictions bypass (CVE-ID: CVE-2018-6106)

The vulnerability allows a remote attacker to bypass security restrictions.

The vulnerability exists due to the incorrect handling of promises in V8. A remote unauthenticated attacker can trick the victim into visiting a specially crafted website, bypass security restrictions and gain unauthorized access to the system.


50) Spoofing attack (CVE-ID: CVE-2018-6107)

The vulnerability allows a remote attacker to perform spoofing attack.

The vulnerability exists due to an error in OmniBox. A remote attacker can trick the victim into visiting a specially crafted website and conduct URL spoofing attacks.


51) Spoofing attack (CVE-ID: CVE-2018-6108)

The vulnerability allows a remote attacker to perform spoofing attack.

The vulnerability exists due to an error in OmniBox. A remote attacker can trick the victim into visiting a specially crafted website and conduct URL spoofing attacks.


52) Security restrictions bypass (CVE-ID: CVE-2018-6109)

The vulnerability allows a remote attacker to bypass security restrictions.

The vulnerability exists due to the incorrect handling of files by FileAPI. A remote unauthenticated attacker can trick the victim into visiting a specially crafted website, bypass security restrictions and gain unauthorized access to the system.


53) Security restrictions bypass (CVE-ID: CVE-2018-6110)

The vulnerability allows a remote attacker to bypass security restrictions.

The vulnerability exists due to the incorrect handling of plaintext files via file://. A remote unauthenticated attacker can trick the victim into visiting a specially crafted website, bypass security restrictions and gain unauthorized access to the system.


54) Heap-use-after-free error (CVE-ID: CVE-2018-6111)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The vulnerability exists due to heap-use-after-free error in DevTools. A remote unauthenticated attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and cause the service.


55) Security restrictions bypass (CVE-ID: CVE-2018-6112)

The vulnerability allows a remote attacker to bypass security restrictions.

The vulnerability exists due to the incorrect URL handling in DevTools.  A remote unauthenticated attacker can trick the victim into visiting a specially crafted website, bypass security restrictions and gain unauthorized access to the system.


56) Spoofing attack (CVE-ID: CVE-2018-6113)

The vulnerability allows a remote attacker to perform spoofing attack.

The vulnerability exists due to an error in Navigation. A remote attacker can trick the victim into visiting a specially crafted website and conduct URL spoofing attacks.


57) Security restrictions bypass (CVE-ID: CVE-2018-6114)

The vulnerability allows a remote attacker to bypass security restrictions.

The vulnerability exists due to unspecified flaw.  A remote unauthenticated attacker can trick the victim into visiting a specially crafted website, bypass CSP and gain unauthorized access to the system.


58) Security restrictions bypass (CVE-ID: CVE-2018-6115)

The vulnerability allows a remote attacker to bypass security restrictions.

The vulnerability exists due to unspecified flaw.  A remote unauthenticated attacker can trick the victim into visiting a specially crafted website, bypass SmartScreen in downloads and gain unauthorized access to the system.


59) Security restrictions bypass (CVE-ID: CVE-2018-6116)

The vulnerability allows a remote attacker to bypass security restrictions.

The vulnerability exists due to the incorrect low memory handling in WebAssembly. A remote unauthenticated attacker can trick the victim into visiting a specially crafted website, bypass security restrictions and gain unauthorized access to the system.


60) Security restrictions bypass (CVE-ID: CVE-2018-6117)

The vulnerability allows a remote attacker to bypass security restrictions.

The vulnerability exists due to an error related to confusing autofill settings. A remote unauthenticated attacker can trick the victim into visiting a specially crafted website, bypass security restrictions and gain unauthorized access to the system.


61) Use-after-free error (CVE-ID: CVE-2018-6118)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to use-after-free error in Media Cache. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.

Successful exploitation of the vulnerability may result in system compromise.

62) Heap-based buffer overflow (CVE-ID: CVE-2018-6120)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to heap-based buffer overflow in PDFium when handling malicious input. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code withe elevated privileges.

Successful exploitation of the vulnerability may result in system compromise.

63) Privilege escalation (CVE-ID: CVE-2018-6121)

The vulnerability allows a remote attacker to gain elevated privileges on the target system.

The weakness exists due to an error in extensions when handling malicious input. A remote attacker can trick the victim into visiting a specially crafted website and execute arbitrary code withe elevated privileges.

Successful exploitation of the vulnerability may result in system compromise.

64) Type confusion (CVE-ID: CVE-2018-6122)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to type confusion in V8 when handling malicious input. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code withe elevated privileges.

Successful exploitation of the vulnerability may result in system compromise.

Remediation

Install update from vendor's website.