Unrated severityNVD Advisory· Published Dec 11, 2018· Updated Aug 5, 2024
CVE-2018-18356
CVE-2018-18356
Description
An integer overflow in path handling lead to a use after free in Skia in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Affected products
26- osv-coords25 versionspkg:rpm/opensuse/chromium&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/firefox-esr&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/MozillaFirefox&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/MozillaThunderbird&distro=openSUSE%20Leap%2015.0pkg:rpm/opensuse/MozillaThunderbird&distro=openSUSE%20Tumbleweedpkg:rpm/suse/chromium&distro=SUSE%20Package%20Hub%2012%20SP2pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Enterprise%20Storage%204pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP3pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP4pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Desktop%20Applications%2015pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCLpkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP3pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP4pkg:rpm/suse/MozillaFirefox&distro=SUSE%20OpenStack%20Cloud%207pkg:rpm/suse/MozillaThunderbird&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2015pkg:rpm/suse/MozillaThunderbird&distro=SUSE%20Package%20Hub%2012
< 93.0.4577.82-1.1+ 24 more
- (no CPE)range: < 93.0.4577.82-1.1
- (no CPE)range: < 128.5.1-1.1
- (no CPE)range: < 92.0-1.2
- (no CPE)range: < 60.6.1-lp150.3.37.1
- (no CPE)range: < 91.1.1-1.1
- (no CPE)range: < 71.0.3578.98-80.1
- (no CPE)range: < 60.6.1esr-109.63.2
- (no CPE)range: < 60.6.1esr-109.63.2
- (no CPE)range: < 60.6.1esr-109.63.2
- (no CPE)range: < 60.6.1-3.29.3
- (no CPE)range: < 60.6.1esr-109.63.2
- (no CPE)range: < 60.6.1esr-109.63.2
- (no CPE)range: < 60.6.1esr-109.63.2
- (no CPE)range: < 60.6.1esr-109.63.2
- (no CPE)range: < 60.6.1esr-109.63.2
- (no CPE)range: < 60.6.1esr-109.63.2
- (no CPE)range: < 60.6.1esr-109.63.2
- (no CPE)range: < 60.6.1esr-109.63.2
- (no CPE)range: < 60.6.1esr-109.63.2
- (no CPE)range: < 60.6.1esr-109.63.2
- (no CPE)range: < 60.6.1esr-109.63.2
- (no CPE)range: < 60.6.1esr-109.63.2
- (no CPE)range: < 60.6.1esr-109.63.2
- (no CPE)range: < 60.5.1-3.24.1
- (no CPE)range: < 60.5.1-79.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
18- lists.opensuse.org/opensuse-security-announce/2019-04/msg00043.htmlmitrevendor-advisoryx_refsource_SUSE
- access.redhat.com/errata/RHSA-2018:3803mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2019:0373mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2019:0374mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2019:1144mitrevendor-advisoryx_refsource_REDHAT
- security.gentoo.org/glsa/201903-04mitrevendor-advisoryx_refsource_GENTOO
- security.gentoo.org/glsa/201904-07mitrevendor-advisoryx_refsource_GENTOO
- security.gentoo.org/glsa/201908-18mitrevendor-advisoryx_refsource_GENTOO
- usn.ubuntu.com/3896-1/mitrevendor-advisoryx_refsource_UBUNTU
- usn.ubuntu.com/3897-1/mitrevendor-advisoryx_refsource_UBUNTU
- www.debian.org/security/2018/dsa-4352mitrevendor-advisoryx_refsource_DEBIAN
- www.debian.org/security/2019/dsa-4391mitrevendor-advisoryx_refsource_DEBIAN
- www.debian.org/security/2019/dsa-4392mitrevendor-advisoryx_refsource_DEBIAN
- www.securityfocus.com/bid/106084mitrevdb-entryx_refsource_BID
- chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.htmlmitrex_refsource_CONFIRM
- crbug.com/883666mitrex_refsource_MISC
- lists.debian.org/debian-lts-announce/2019/02/msg00023.htmlmitremailing-listx_refsource_MLIST
- lists.debian.org/debian-lts-announce/2019/02/msg00024.htmlmitremailing-listx_refsource_MLIST
News mentions
0No linked articles in our index yet.