An incorrect assumption about block structure in Blink in Google Chrome prior to 57.0.2987.133 for Mac, Windows, and Linux, and 57.0.2987.132 for Android, allowed a remote attacker to potentially exploit memory corruption via a crafted HTML page that triggers improper casting.

Am I vulnerable?

The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.

Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.

Sign up for monitoring

Affected package information

Release Package Patched in
artful chromium-browser 58.0.3029.81-0ubuntu2.1350
oxide-qt None
devel chromium-browser 58.0.3029.81-0ubuntu2.1350
trusty chromium-browser 58.0.3029.81-0ubuntu0.14.04.1172
oxide-qt None
upstream chromium-browser 57.0.2987.133
xenial chromium-browser 58.0.3029.81-0ubuntu0.16.04.1277
oxide-qt None
yakkety chromium-browser 58.0.3029.81-0ubuntu0.16.10.1345
zesty chromium-browser 58.0.3029.81-0ubuntu2.17.04.1350


Release Package Reason
precise chromium-browser ignored
oxide-qt DNE
precise/esm chromium-browser DNE
oxide-qt DNE
vivid/ubuntu-core chromium-browser DNE
oxide-qt DNE
vivid/stable-phone-overlay chromium-browser DNE
oxide-qt ignored
yakkety oxide-qt ignored
zesty oxide-qt ignored
devel oxide-qt DNE

Needs Triage

Release Package Reason
upstream oxide-qt needs-triage