2018-10-15 09:04:21 -04:00
{
2018-12-11 10:37:08 -05:00
"CVE_data_meta" : {
"ASSIGNER" : "chrome-cve-admin@google.com" ,
"ID" : "CVE-2018-18356" ,
"STATE" : "PUBLIC"
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
2018-12-10 18:04:59 -08:00
{
2018-12-11 10:37:08 -05:00
"product" : {
"product_data" : [
{
"product_name" : "Chrome" ,
"version" : {
"version_data" : [
{
"version_affected" : "<" ,
"version_value" : "71.0.3578.80"
}
]
}
}
]
} ,
"vendor_name" : "Google"
2018-12-10 18:04:59 -08:00
}
2018-12-11 10:37:08 -05:00
]
}
} ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
"value" : "An integer overflow in path handling lead to a use after free in Skia in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page."
}
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "Use after free"
}
]
}
]
} ,
"references" : {
"reference_data" : [
2019-02-16 06:03:51 -05:00
{
"name" : "[debian-lts-announce] 20190215 [SECURITY] [DLA 1677-1] firefox-esr security update" ,
"refsource" : "MLIST" ,
"url" : "https://lists.debian.org/debian-lts-announce/2019/02/msg00023.html"
} ,
2019-02-17 06:03:56 -05:00
{
"name" : "[debian-lts-announce] 20190216 [SECURITY] [DLA 1678-1] thunderbird security update" ,
"refsource" : "MLIST" ,
"url" : "https://lists.debian.org/debian-lts-announce/2019/02/msg00024.html"
} ,
2018-12-11 10:37:08 -05:00
{
"name" : "https://crbug.com/883666" ,
"refsource" : "MISC" ,
"url" : "https://crbug.com/883666"
} ,
{
"name" : "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html" ,
"refsource" : "CONFIRM" ,
"url" : "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html"
2018-12-12 06:07:39 -05:00
} ,
{
"name" : "DSA-4352" ,
"refsource" : "DEBIAN" ,
"url" : "https://www.debian.org/security/2018/dsa-4352"
} ,
2019-02-16 06:03:51 -05:00
{
"name" : "DSA-4391" ,
"refsource" : "DEBIAN" ,
"url" : "https://www.debian.org/security/2019/dsa-4391"
} ,
2019-02-17 06:03:56 -05:00
{
"name" : "DSA-4392" ,
"refsource" : "DEBIAN" ,
"url" : "https://www.debian.org/security/2019/dsa-4392"
} ,
2019-03-11 06:40:13 -04:00
{
"name" : "GLSA-201903-04" ,
"refsource" : "GENTOO" ,
"url" : "https://security.gentoo.org/glsa/201903-04"
} ,
2018-12-12 06:07:39 -05:00
{
"name" : "RHSA-2018:3803" ,
"refsource" : "REDHAT" ,
"url" : "https://access.redhat.com/errata/RHSA-2018:3803"
} ,
2019-02-20 06:03:49 -05:00
{
"name" : "RHSA-2019:0373" ,
"refsource" : "REDHAT" ,
"url" : "https://access.redhat.com/errata/RHSA-2019:0373"
} ,
{
"name" : "RHSA-2019:0374" ,
"refsource" : "REDHAT" ,
"url" : "https://access.redhat.com/errata/RHSA-2019:0374"
} ,
2019-02-27 06:04:16 -05:00
{
"name" : "USN-3896-1" ,
"refsource" : "UBUNTU" ,
"url" : "https://usn.ubuntu.com/3896-1/"
} ,
{
"name" : "USN-3897-1" ,
"refsource" : "UBUNTU" ,
"url" : "https://usn.ubuntu.com/3897-1/"
} ,
2018-12-12 06:07:39 -05:00
{
"name" : "106084" ,
"refsource" : "BID" ,
"url" : "http://www.securityfocus.com/bid/106084"
2018-12-11 10:37:08 -05:00
}
]
}
}