[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-OPENSUSE-SU-2018:1175-1":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-08T14:11:31.067Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":11,"aliases":12,"duplicate_of":9,"upstream":13,"downstream":142,"duplicates":143,"related":144,"reserved_at":9,"published_at":209,"modified_at":210,"state":9,"summary":211,"references_raw":213,"kevs":506,"epss":9,"epss_history":507,"metrics":508,"affected":509},"OPENSUSE-SU-2018:1175-1","Security update for Chromium\n\nThis update for Chromium to version 66.0.3359.181 fixes the following issues:\n\n- CVE-2018-6118: Use after free in Media Cache (bsc#1091288)\n- CVE-2018-6085: Use after free in Disk Cache\n- CVE-2018-6086: Use after free in Disk Cache\n- CVE-2018-6087: Use after free in WebAssembly\n- CVE-2018-6088: Use after free in PDFium\n- CVE-2018-6089: Same origin policy bypass in Service Worker\n- CVE-2018-6090: Heap buffer overflow in Skia\n- CVE-2018-6091: Incorrect handling of plug-ins by Service Worker\n- CVE-2018-6092: Integer overflow in WebAssembly\n- CVE-2018-6093: Same origin bypass in Service Worker\n- CVE-2018-6094: Exploit hardening regression in Oilpan\n- CVE-2018-6095: Lack of meaningful user interaction requirement before file upload\n- CVE-2018-6096: Fullscreen UI spoof\n- CVE-2018-6097: Fullscreen UI spoof\n- CVE-2018-6098: URL spoof in Omnibox\n- CVE-2018-6099: CORS bypass in ServiceWorker\n- CVE-2018-6100: URL spoof in Omnibox\n- CVE-2018-6101: Insufficient protection of remote debugging prototol in DevTools \n- CVE-2018-6102: URL spoof in Omnibox\n- CVE-2018-6103: UI spoof in Permissions\n- CVE-2018-6104: URL spoof in Omnibox\n- CVE-2018-6105: URL spoof in Omnibox\n- CVE-2018-6106: Incorrect handling of promises in V8\n- CVE-2018-6107: URL spoof in Omnibox\n- CVE-2018-6108: URL spoof in Omnibox\n- CVE-2018-6109: Incorrect handling of files by FileAPI\n- CVE-2018-6110: Incorrect handling of plaintext files via file:// \n- CVE-2018-6111: Heap-use-after-free in DevTools\n- CVE-2018-6112: Incorrect URL handling in DevTools\n- CVE-2018-6113: URL spoof in Navigation\n- CVE-2018-6114: CSP bypass\n- CVE-2018-6115: SmartScreen bypass in downloads\n- CVE-2018-6116: Incorrect low memory handling in WebAssembly\n- CVE-2018-6117: Confusing autofill settings\n- CVE-2017-11215: Use after free in Flash\n- CVE-2017-11225: Use after free in Flash\n- CVE-2018-6060: Use after free in Blink\n- CVE-2018-6061: Race condition in V8\n- CVE-2018-6062: Heap buffer overflow in Skia\n- CVE-2018-6057: Incorrect permissions on shared memory\n- CVE-2018-6063: Incorrect permissions on shared memory\n- CVE-2018-6064: Type confusion in V8\n- CVE-2018-6065: Integer overflow in V8\n- CVE-2018-6066: Same Origin Bypass via canvas\n- CVE-2018-6067: Buffer overflow in Skia\n- CVE-2018-6068: Object lifecycle issues in Chrome Custom Tab\n- CVE-2018-6069: Stack buffer overflow in Skia\n- CVE-2018-6070: CSP bypass through extensions\n- CVE-2018-6071: Heap bufffer overflow in Skia\n- CVE-2018-6072: Integer overflow in PDFium\n- CVE-2018-6073: Heap bufffer overflow in WebGL\n- CVE-2018-6074: Mark-of-the-Web bypass\n- CVE-2018-6075: Overly permissive cross origin downloads\n- CVE-2018-6076: Incorrect handling of URL fragment identifiers in Blink\n- CVE-2018-6077: Timing attack using SVG filters\n- CVE-2018-6078: URL Spoof in OmniBox\n- CVE-2018-6079: Information disclosure via texture data in WebGL\n- CVE-2018-6080: Information disclosure in IPC call\n- CVE-2018-6081: XSS in interstitials\n- CVE-2018-6082: Circumvention of port blocking\n- CVE-2018-6083: Incorrect processing of AppManifests\n- CVE-2018-6121: Privilege Escalation in extensions\n- CVE-2018-6122: Type confusion in V8\n- CVE-2018-6120: Heap buffer overflow in PDFium    \n- bsc#1086124: Various fixes from internal audits, fuzzing and other initiatives\n\nThis update also supports mitigation against the Spectre vulnerabilities:\n\n'Strict site isolation' is disabled for most users and can be turned on via:\nchrome://flags/#enable-site-per-process\n\nThis feature is undergoing a small percentage trial. Out out of the trial is possible via:\nchrome://flags/#site-isolation-trial-opt-out\n\n    \nThe following tracked packaging bug were fixed:\n\n- Chromium could not be installed from SUSE PackageHub 12 without having the SDK enabled (bsc#1070421)\n- Chromium could not be installed when libminizip1 was not available (bsc#1093031)\n",null,[],[],[],[14,16,18,20,22,24,26,28,30,32,34,36,38,40,42,44,46,48,50,52,54,56,58,60,62,64,66,68,70,72,74,76,78,80,82,84,86,88,90,92,94,96,98,100,102,104,106,108,110,112,114,116,118,120,122,124,126,128,130,132,134,136,138,140],{"_key":15},"CVE-2017-11215",{"_key":17},"CVE-2017-11225",{"_key":19},"CVE-2018-6057",{"_key":21},"CVE-2018-6060",{"_key":23},"CVE-2018-6061",{"_key":25},"CVE-2018-6062",{"_key":27},"CVE-2018-6063",{"_key":29},"CVE-2018-6064",{"_key":31},"CVE-2018-6065",{"_key":33},"CVE-2018-6066",{"_key":35},"CVE-2018-6067",{"_key":37},"CVE-2018-6068",{"_key":39},"CVE-2018-6069",{"_key":41},"CVE-2018-6070",{"_key":43},"CVE-2018-6071",{"_key":45},"CVE-2018-6072",{"_key":47},"CVE-2018-6073",{"_key":49},"CVE-2018-6074",{"_key":51},"CVE-2018-6075",{"_key":53},"CVE-2018-6076",{"_key":55},"CVE-2018-6077",{"_key":57},"CVE-2018-6078",{"_key":59},"CVE-2018-6079",{"_key":61},"CVE-2018-6080",{"_key":63},"CVE-2018-6081",{"_key":65},"CVE-2018-6082",{"_key":67},"CVE-2018-6083",{"_key":69},"CVE-2018-6085",{"_key":71},"CVE-2018-6086",{"_key":73},"CVE-2018-6087",{"_key":75},"CVE-2018-6088",{"_key":77},"CVE-2018-6089",{"_key":79},"CVE-2018-6090",{"_key":81},"CVE-2018-6091",{"_key":83},"CVE-2018-6092",{"_key":85},"CVE-2018-6093",{"_key":87},"CVE-2018-6094",{"_key":89},"CVE-2018-6095",{"_key":91},"CVE-2018-6096",{"_key":93},"CVE-2018-6097",{"_key":95},"CVE-2018-6098",{"_key":97},"CVE-2018-6099",{"_key":99},"CVE-2018-6100",{"_key":101},"CVE-2018-6101",{"_key":103},"CVE-2018-6102",{"_key":105},"CVE-2018-6103",{"_key":107},"CVE-2018-6104",{"_key":109},"CVE-2018-6105",{"_key":111},"CVE-2018-6106",{"_key":113},"CVE-2018-6107",{"_key":115},"CVE-2018-6108",{"_key":117},"CVE-2018-6109",{"_key":119},"CVE-2018-6110",{"_key":121},"CVE-2018-6111",{"_key":123},"CVE-2018-6112",{"_key":125},"CVE-2018-6113",{"_key":127},"CVE-2018-6114",{"_key":129},"CVE-2018-6115",{"_key":131},"CVE-2018-6116",{"_key":133},"CVE-2018-6117",{"_key":135},"CVE-2018-6118",{"_key":137},"CVE-2018-6120",{"_key":139},"CVE-2018-6121",{"_key":141},"CVE-2018-6122",[],[],[145,146,147,148,149,150,151,152,153,154,155,156,157,158,159,160,161,162,163,164,165,166,167,168,169,170,171,172,173,174,175,176,177,178,179,180,181,182,183,184,185,186,187,188,189,190,191,192,193,194,195,196,197,198,199,200,201,202,203,204,205,206,207,208],{"_key":15},{"_key":17},{"_key":19},{"_key":21},{"_key":23},{"_key":25},{"_key":27},{"_key":29},{"_key":31},{"_key":33},{"_key":35},{"_key":37},{"_key":39},{"_key":41},{"_key":43},{"_key":45},{"_key":47},{"_key":49},{"_key":51},{"_key":53},{"_key":55},{"_key":57},{"_key":59},{"_key":61},{"_key":63},{"_key":65},{"_key":67},{"_key":69},{"_key":71},{"_key":73},{"_key":75},{"_key":77},{"_key":79},{"_key":81},{"_key":83},{"_key":85},{"_key":87},{"_key":89},{"_key":91},{"_key":93},{"_key":95},{"_key":97},{"_key":99},{"_key":101},{"_key":103},{"_key":105},{"_key":107},{"_key":109},{"_key":111},{"_key":113},{"_key":115},{"_key":117},{"_key":119},{"_key":121},{"_key":123},{"_key":125},{"_key":127},{"_key":129},{"_key":131},{"_key":133},{"_key":135},{"_key":137},{"_key":139},{"_key":141},"2018-05-27T11:26:33Z","2026-02-04T04:28:52.540012Z",{"cisa_kev":212,"cisa_ransomware":212,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":9,"severity_score":9,"severity_version":9,"severity_source":9,"severity_vector":9,"severity_status":9},false,[214,220,225,229,233,237,241,245,249,254,258,262,266,270,274,278,282,286,290,294,298,302,306,310,314,318,322,326,330,334,338,342,346,350,354,358,362,366,370,374,378,382,386,390,394,398,402,406,410,414,418,422,426,430,434,438,442,446,450,454,458,462,466,470,474,478,482,486,490,494,498,502],{"url":215,"sources":216,"tags":218},"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IDH7ZAFKSWX2J7H7ULZFAVM7KUQXQHZZ/#IDH7ZAFKSWX2J7H7ULZFAVM7KUQXQHZZ",[217],"osv_suse",[219],"Advisory",{"url":221,"sources":222,"tags":223},"https://bugzilla.suse.com/1084296",[217],[224],"REPORT",{"url":226,"sources":227,"tags":228},"https://bugzilla.suse.com/1086124",[217],[224],{"url":230,"sources":231,"tags":232},"https://bugzilla.suse.com/1090000",[217],[224],{"url":234,"sources":235,"tags":236},"https://bugzilla.suse.com/1091288",[217],[224],{"url":238,"sources":239,"tags":240},"https://bugzilla.suse.com/1092272",[217],[224],{"url":242,"sources":243,"tags":244},"https://bugzilla.suse.com/1092923",[217],[224],{"url":246,"sources":247,"tags":248},"https://bugzilla.suse.com/1093031",[217],[224],{"url":250,"sources":251,"tags":252},"https://www.suse.com/security/cve/CVE-2017-11215",[217],[253],"WEB",{"url":255,"sources":256,"tags":257},"https://www.suse.com/security/cve/CVE-2017-11225",[217],[253],{"url":259,"sources":260,"tags":261},"https://www.suse.com/security/cve/CVE-2018-6057",[217],[253],{"url":263,"sources":264,"tags":265},"https://www.suse.com/security/cve/CVE-2018-6060",[217],[253],{"url":267,"sources":268,"tags":269},"https://www.suse.com/security/cve/CVE-2018-6061",[217],[253],{"url":271,"sources":272,"tags":273},"https://www.suse.com/security/cve/CVE-2018-6062",[217],[253],{"url":275,"sources":276,"tags":277},"https://www.suse.com/security/cve/CVE-2018-6063",[217],[253],{"url":279,"sources":280,"tags":281},"https://www.suse.com/security/cve/CVE-2018-6064",[217],[253],{"url":283,"sources":284,"tags":285},"https://www.suse.com/security/cve/CVE-2018-6065",[217],[253],{"url":287,"sources":288,"tags":289},"https://www.suse.com/security/cve/CVE-2018-6066",[217],[253],{"url":291,"sources":292,"tags":293},"https://www.suse.com/security/cve/CVE-2018-6067",[217],[253],{"url":295,"sources":296,"tags":297},"https://www.suse.com/security/cve/CVE-2018-6068",[217],[253],{"url":299,"sources":300,"tags":301},"https://www.suse.com/security/cve/CVE-2018-6069",[217],[253],{"url":303,"sources":304,"tags":305},"https://www.suse.com/security/cve/CVE-2018-6070",[217],[253],{"url":307,"sources":308,"tags":309},"https://www.suse.com/security/cve/CVE-2018-6071",[217],[253],{"url":311,"sources":312,"tags":313},"https://www.suse.com/security/cve/CVE-2018-6072",[217],[253],{"url":315,"sources":316,"tags":317},"https://www.suse.com/security/cve/CVE-2018-6073",[217],[253],{"url":319,"sources":320,"tags":321},"https://www.suse.com/security/cve/CVE-2018-6074",[217],[253],{"url":323,"sources":324,"tags":325},"https://www.suse.com/security/cve/CVE-2018-6075",[217],[253],{"url":327,"sources":328,"tags":329},"https://www.suse.com/security/cve/CVE-2018-6076",[217],[253],{"url":331,"sources":332,"tags":333},"https://www.suse.com/security/cve/CVE-2018-6077",[217],[253],{"url":335,"sources":336,"tags":337},"https://www.suse.com/security/cve/CVE-2018-6078",[217],[253],{"url":339,"sources":340,"tags":341},"https://www.suse.com/security/cve/CVE-2018-6079",[217],[253],{"url":343,"sources":344,"tags":345},"https://www.suse.com/security/cve/CVE-2018-6080",[217],[253],{"url":347,"sources":348,"tags":349},"https://www.suse.com/security/cve/CVE-2018-6081",[217],[253],{"url":351,"sources":352,"tags":353},"https://www.suse.com/security/cve/CVE-2018-6082",[217],[253],{"url":355,"sources":356,"tags":357},"https://www.suse.com/security/cve/CVE-2018-6083",[217],[253],{"url":359,"sources":360,"tags":361},"https://www.suse.com/security/cve/CVE-2018-6085",[217],[253],{"url":363,"sources":364,"tags":365},"https://www.suse.com/security/cve/CVE-2018-6086",[217],[253],{"url":367,"sources":368,"tags":369},"https://www.suse.com/security/cve/CVE-2018-6087",[217],[253],{"url":371,"sources":372,"tags":373},"https://www.suse.com/security/cve/CVE-2018-6088",[217],[253],{"url":375,"sources":376,"tags":377},"https://www.suse.com/security/cve/CVE-2018-6089",[217],[253],{"url":379,"sources":380,"tags":381},"https://www.suse.com/security/cve/CVE-2018-6090",[217],[253],{"url":383,"sources":384,"tags":385},"https://www.suse.com/security/cve/CVE-2018-6091",[217],[253],{"url":387,"sources":388,"tags":389},"https://www.suse.com/security/cve/CVE-2018-6092",[217],[253],{"url":391,"sources":392,"tags":393},"https://www.suse.com/security/cve/CVE-2018-6093",[217],[253],{"url":395,"sources":396,"tags":397},"https://www.suse.com/security/cve/CVE-2018-6094",[217],[253],{"url":399,"sources":400,"tags":401},"https://www.suse.com/security/cve/CVE-2018-6095",[217],[253],{"url":403,"sources":404,"tags":405},"https://www.suse.com/security/cve/CVE-2018-6096",[217],[253],{"url":407,"sources":408,"tags":409},"https://www.suse.com/security/cve/CVE-2018-6097",[217],[253],{"url":411,"sources":412,"tags":413},"https://www.suse.com/security/cve/CVE-2018-6098",[217],[253],{"url":415,"sources":416,"tags":417},"https://www.suse.com/security/cve/CVE-2018-6099",[217],[253],{"url":419,"sources":420,"tags":421},"https://www.suse.com/security/cve/CVE-2018-6100",[217],[253],{"url":423,"sources":424,"tags":425},"https://www.suse.com/security/cve/CVE-2018-6101",[217],[253],{"url":427,"sources":428,"tags":429},"https://www.suse.com/security/cve/CVE-2018-6102",[217],[253],{"url":431,"sources":432,"tags":433},"https://www.suse.com/security/cve/CVE-2018-6103",[217],[253],{"url":435,"sources":436,"tags":437},"https://www.suse.com/security/cve/CVE-2018-6104",[217],[253],{"url":439,"sources":440,"tags":441},"https://www.suse.com/security/cve/CVE-2018-6105",[217],[253],{"url":443,"sources":444,"tags":445},"https://www.suse.com/security/cve/CVE-2018-6106",[217],[253],{"url":447,"sources":448,"tags":449},"https://www.suse.com/security/cve/CVE-2018-6107",[217],[253],{"url":451,"sources":452,"tags":453},"https://www.suse.com/security/cve/CVE-2018-6108",[217],[253],{"url":455,"sources":456,"tags":457},"https://www.suse.com/security/cve/CVE-2018-6109",[217],[253],{"url":459,"sources":460,"tags":461},"https://www.suse.com/security/cve/CVE-2018-6110",[217],[253],{"url":463,"sources":464,"tags":465},"https://www.suse.com/security/cve/CVE-2018-6111",[217],[253],{"url":467,"sources":468,"tags":469},"https://www.suse.com/security/cve/CVE-2018-6112",[217],[253],{"url":471,"sources":472,"tags":473},"https://www.suse.com/security/cve/CVE-2018-6113",[217],[253],{"url":475,"sources":476,"tags":477},"https://www.suse.com/security/cve/CVE-2018-6114",[217],[253],{"url":479,"sources":480,"tags":481},"https://www.suse.com/security/cve/CVE-2018-6115",[217],[253],{"url":483,"sources":484,"tags":485},"https://www.suse.com/security/cve/CVE-2018-6116",[217],[253],{"url":487,"sources":488,"tags":489},"https://www.suse.com/security/cve/CVE-2018-6117",[217],[253],{"url":491,"sources":492,"tags":493},"https://www.suse.com/security/cve/CVE-2018-6118",[217],[253],{"url":495,"sources":496,"tags":497},"https://www.suse.com/security/cve/CVE-2018-6120",[217],[253],{"url":499,"sources":500,"tags":501},"https://www.suse.com/security/cve/CVE-2018-6121",[217],[253],{"url":503,"sources":504,"tags":505},"https://www.suse.com/security/cve/CVE-2018-6122",[217],[253],[],[],[],[510],{"ecosystem":511,"name":512,"vendor":513,"product":514,"cpe_part":9,"purl_type":515,"purl_namespace":513,"purl_name":514,"source":9,"versions":516},"SUSE Linux Enterprise","chromium","suse","chromium&distro=SUSE Package Hub 12 SP2","rpm",[517],{"version":518,"is_range":519,"range_type":520,"version_start":9,"version_start_type":9,"version_end":521,"version_end_type":522,"fixed_in":9},"lt66_0_3359_181_55_1",true,"ecosystem","66.0.3359.181-55.1","excluding"]