9.6 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.974 High
EPSS
Percentile
99.9%
Severity: Critical
Date : 2018-10-17
CVE-ID : CVE-2018-5179 CVE-2018-17462 CVE-2018-17463 CVE-2018-17464
CVE-2018-17465 CVE-2018-17466 CVE-2018-17467 CVE-2018-17468
CVE-2018-17469 CVE-2018-17470 CVE-2018-17471 CVE-2018-17473
CVE-2018-17474 CVE-2018-17475 CVE-2018-17476 CVE-2018-17477
Package : chromium
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-781
The package chromium before version 70.0.3538.67-1 is vulnerable to
multiple issues including arbitrary code execution, content spoofing,
sandbox escape, information disclosure and denial of service.
Upgrade to 70.0.3538.67-1.
The problems have been fixed upstream in version 70.0.3538.67.
None.
A security issue has been found in the ServiceWorker component of the
chromium browser before 70.0.3538.67, due to a lack of limits on the
update() function.
A sandbox escape has been found in the AppCache component of the
chromium browser before 70.0.3538.67.
A remote code execution issue has been found in the V8 component of the
chromium browser before 70.0.3538.67.
A URL spoofing issue has been found in the Omnibox component of the
chromium browser before 70.0.3538.67.
A use-after-free issue has been found in the V8 component of the
chromium browser before 70.0.3538.67.
A memory corruption issue has been found in the Angle component of the
chromium browser before 70.0.3538.67.
A URL spoofing issue has been found in the Omnibox component of the
chromium browser before 70.0.3538.67.
A cross-origin URL disclosure issue has been found in the Blink
component of the chromium browser before 70.0.3538.67.
A heap-based buffer overflow has been found in the PDFium component of
the chromium browser before 70.0.3538.67.
A memory corruption issue has been found in the GPU internals component
of the chromium browser before 70.0.3538.67.
A security UI occlusion has been found in the the full screen mode of
the chromium browser before 70.0.3538.67.
A URL spoofing issue has been found in the Omnibox component of the
chromium browser before 70.0.3538.67.
A use-after-free has been found in the Blink component of the chromium
browser before 70.0.3538.67.
A URL spoofing issue has been found in the Omnibox component of the
chromium browser before 70.0.3538.67.
A security UI occlusion has been found in the the full screen mode of
the chromium browser before 70.0.3538.67.
A UI spoofing issue has been found in the Extensions component of the
chromium browser before 70.0.3538.67.
A remote attacker can spoof the URL or the security status of a page,
access sensitive information, crash the browser or execute arbitrary
code on the affected host.
https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html
https://bugs.chromium.org/p/chromium/issues/detail?id=805496
https://bugs.chromium.org/p/chromium/issues/detail?id=888926
https://bugs.chromium.org/p/chromium/issues/detail?id=888923
https://bugs.chromium.org/p/chromium/issues/detail?id=887273
https://bugs.chromium.org/p/chromium/issues/detail?id=870226
https://bugs.chromium.org/p/chromium/issues/detail?id=880906
https://bugs.chromium.org/p/chromium/issues/detail?id=844881
https://bugs.chromium.org/p/chromium/issues/detail?id=876822
https://bugs.chromium.org/p/chromium/issues/detail?id=880675
https://bugs.chromium.org/p/chromium/issues/detail?id=877874
https://bugs.chromium.org/p/chromium/issues/detail?id=873080
https://bugs.chromium.org/p/chromium/issues/detail?id=882078
https://bugs.chromium.org/p/chromium/issues/detail?id=843151
https://bugs.chromium.org/p/chromium/issues/detail?id=852634
https://bugs.chromium.org/p/chromium/issues/detail?id=812769
https://bugs.chromium.org/p/chromium/issues/detail?id=863703
https://security.archlinux.org/CVE-2018-5179
https://security.archlinux.org/CVE-2018-17462
https://security.archlinux.org/CVE-2018-17463
https://security.archlinux.org/CVE-2018-17464
https://security.archlinux.org/CVE-2018-17465
https://security.archlinux.org/CVE-2018-17466
https://security.archlinux.org/CVE-2018-17467
https://security.archlinux.org/CVE-2018-17468
https://security.archlinux.org/CVE-2018-17469
https://security.archlinux.org/CVE-2018-17470
https://security.archlinux.org/CVE-2018-17471
https://security.archlinux.org/CVE-2018-17473
https://security.archlinux.org/CVE-2018-17474
https://security.archlinux.org/CVE-2018-17475
https://security.archlinux.org/CVE-2018-17476
https://security.archlinux.org/CVE-2018-17477
bugs.chromium.org/p/chromium/issues/detail?id=805496
bugs.chromium.org/p/chromium/issues/detail?id=812769
bugs.chromium.org/p/chromium/issues/detail?id=843151
bugs.chromium.org/p/chromium/issues/detail?id=844881
bugs.chromium.org/p/chromium/issues/detail?id=852634
bugs.chromium.org/p/chromium/issues/detail?id=863703
bugs.chromium.org/p/chromium/issues/detail?id=870226
bugs.chromium.org/p/chromium/issues/detail?id=873080
bugs.chromium.org/p/chromium/issues/detail?id=876822
bugs.chromium.org/p/chromium/issues/detail?id=877874
bugs.chromium.org/p/chromium/issues/detail?id=880675
bugs.chromium.org/p/chromium/issues/detail?id=880906
bugs.chromium.org/p/chromium/issues/detail?id=882078
bugs.chromium.org/p/chromium/issues/detail?id=887273
bugs.chromium.org/p/chromium/issues/detail?id=888923
bugs.chromium.org/p/chromium/issues/detail?id=888926
chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html
security.archlinux.org/AVG-781
security.archlinux.org/CVE-2018-17462
security.archlinux.org/CVE-2018-17463
security.archlinux.org/CVE-2018-17464
security.archlinux.org/CVE-2018-17465
security.archlinux.org/CVE-2018-17466
security.archlinux.org/CVE-2018-17467
security.archlinux.org/CVE-2018-17468
security.archlinux.org/CVE-2018-17469
security.archlinux.org/CVE-2018-17470
security.archlinux.org/CVE-2018-17471
security.archlinux.org/CVE-2018-17473
security.archlinux.org/CVE-2018-17474
security.archlinux.org/CVE-2018-17475
security.archlinux.org/CVE-2018-17476
security.archlinux.org/CVE-2018-17477
security.archlinux.org/CVE-2018-5179
9.6 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.974 High
EPSS
Percentile
99.9%