Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2016-1634
Vulnerability from cvelistv5
Published
2016-03-06 02:00
Modified
2024-08-05 23:02
Severity ?
EPSS score ?
Summary
Use-after-free vulnerability in the StyleResolver::appendCSSStyleSheet function in WebKit/Source/core/css/resolver/StyleResolver.cpp in Blink, as used in Google Chrome before 49.0.2623.75, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted web site that triggers Cascading Style Sheets (CSS) style invalidation during a certain subtree-removal action.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T23:02:12.428Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2016:0664", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00014.html" }, { "name": "openSUSE-SU-2016:0684", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00018.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://code.google.com/p/chromium/issues/detail?id=559292" }, { "name": "84008", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/84008" }, { "name": "DSA-3507", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2016/dsa-3507" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://codereview.chromium.org/1556963002" }, { "name": "1035185", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1035185" }, { "name": "openSUSE-SU-2016:0729", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00028.html" }, { "name": "SUSE-SU-2016:0665", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00015.html" }, { "name": "GLSA-201603-09", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201603-09" }, { "name": "USN-2920-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2920-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-03-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Use-after-free vulnerability in the StyleResolver::appendCSSStyleSheet function in WebKit/Source/core/css/resolver/StyleResolver.cpp in Blink, as used in Google Chrome before 49.0.2623.75, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted web site that triggers Cascading Style Sheets (CSS) style invalidation during a certain subtree-removal action." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-01T15:57:02", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "name": "openSUSE-SU-2016:0664", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00014.html" }, { "name": "openSUSE-SU-2016:0684", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00018.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://code.google.com/p/chromium/issues/detail?id=559292" }, { "name": "84008", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/84008" }, { "name": "DSA-3507", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2016/dsa-3507" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://codereview.chromium.org/1556963002" }, { "name": "1035185", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1035185" }, { "name": "openSUSE-SU-2016:0729", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00028.html" }, { "name": "SUSE-SU-2016:0665", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00015.html" }, { "name": "GLSA-201603-09", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201603-09" }, { "name": "USN-2920-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2920-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2016-1634", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Use-after-free vulnerability in the StyleResolver::appendCSSStyleSheet function in WebKit/Source/core/css/resolver/StyleResolver.cpp in Blink, as used in Google Chrome before 49.0.2623.75, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted web site that triggers Cascading Style Sheets (CSS) style invalidation during a certain subtree-removal action." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2016:0664", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00014.html" }, { "name": "openSUSE-SU-2016:0684", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00018.html" }, { "name": "https://code.google.com/p/chromium/issues/detail?id=559292", "refsource": "CONFIRM", "url": "https://code.google.com/p/chromium/issues/detail?id=559292" }, { "name": "84008", "refsource": "BID", "url": "http://www.securityfocus.com/bid/84008" }, { "name": "DSA-3507", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2016/dsa-3507" }, { "name": "https://codereview.chromium.org/1556963002", "refsource": "CONFIRM", "url": "https://codereview.chromium.org/1556963002" }, { "name": "1035185", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1035185" }, { "name": "openSUSE-SU-2016:0729", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00028.html" }, { "name": "SUSE-SU-2016:0665", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00015.html" }, { "name": "GLSA-201603-09", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201603-09" }, { "name": "USN-2920-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2920-1" }, { "name": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "refsource": "CONFIRM", "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2016-1634", "datePublished": "2016-03-06T02:00:00", "dateReserved": "2016-01-12T00:00:00", "dateUpdated": "2024-08-05T23:02:12.428Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2016-1634\",\"sourceIdentifier\":\"chrome-cve-admin@google.com\",\"published\":\"2016-03-06T02:59:05.463\",\"lastModified\":\"2024-11-21T02:46:46.783\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Use-after-free vulnerability in the StyleResolver::appendCSSStyleSheet function in WebKit/Source/core/css/resolver/StyleResolver.cpp in Blink, as used in Google Chrome before 49.0.2623.75, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted web site that triggers Cascading Style Sheets (CSS) style invalidation during a certain subtree-removal action.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de uso despu\u00e9s de liberaci\u00f3n de memoria en la funci\u00f3n StyleResolver::appendCSSStyleSheet en WebKit/Source/core/css/resolver/StyleResolver.cpp en Blink, tal como se utiliza en Google Chrome en versiones anteriores a 49.0.2623.75, permite a atacantes remotos provocar una denegaci\u00f3n de servicio o posiblemente tener otro impacto no especificado a trav\u00e9s de un sitio web manipulado que desencadena la invalidaci\u00f3n del estilo Cascading Style Sheets (CSS) durante cierta acci\u00f3n de eliminaci\u00f3n de sub\u00e1rbol.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\"baseScore\":9.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"48.0.2564.116\",\"matchCriteriaId\":\"99CABF0F-D201-46AE-83DC-09257264BF7D\"}]}]}],\"references\":[{\"url\":\"http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00014.html\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00015.html\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00018.html\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00028.html\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://www.debian.org/security/2016/dsa-3507\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://www.securityfocus.com/bid/84008\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://www.securitytracker.com/id/1035185\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2920-1\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"https://code.google.com/p/chromium/issues/detail?id=559292\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"https://codereview.chromium.org/1556963002\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"https://security.gentoo.org/glsa/201603-09\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00014.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00015.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00018.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00028.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2016/dsa-3507\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/84008\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id/1035185\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2920-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://code.google.com/p/chromium/issues/detail?id=559292\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://codereview.chromium.org/1556963002\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/201603-09\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"evaluatorComment\":\"\u003ca href=\\\"http://cwe.mitre.org/data/definitions/416.html\\\"\u003eCWE-416: Use After Free\u003c/a\u003e\"}}" } }
gsd-2016-1634
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
Use-after-free vulnerability in the StyleResolver::appendCSSStyleSheet function in WebKit/Source/core/css/resolver/StyleResolver.cpp in Blink, as used in Google Chrome before 49.0.2623.75, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted web site that triggers Cascading Style Sheets (CSS) style invalidation during a certain subtree-removal action.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2016-1634", "description": "Use-after-free vulnerability in the StyleResolver::appendCSSStyleSheet function in WebKit/Source/core/css/resolver/StyleResolver.cpp in Blink, as used in Google Chrome before 49.0.2623.75, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted web site that triggers Cascading Style Sheets (CSS) style invalidation during a certain subtree-removal action.", "id": "GSD-2016-1634", "references": [ "https://www.suse.com/security/cve/CVE-2016-1634.html", "https://www.debian.org/security/2016/dsa-3507", "https://access.redhat.com/errata/RHSA-2016:0359", "https://ubuntu.com/security/CVE-2016-1634", "https://advisories.mageia.org/CVE-2016-1634.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2016-1634" ], "details": "Use-after-free vulnerability in the StyleResolver::appendCSSStyleSheet function in WebKit/Source/core/css/resolver/StyleResolver.cpp in Blink, as used in Google Chrome before 49.0.2623.75, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted web site that triggers Cascading Style Sheets (CSS) style invalidation during a certain subtree-removal action.", "id": "GSD-2016-1634", "modified": "2023-12-13T01:21:24.117906Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2016-1634", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Use-after-free vulnerability in the StyleResolver::appendCSSStyleSheet function in WebKit/Source/core/css/resolver/StyleResolver.cpp in Blink, as used in Google Chrome before 49.0.2623.75, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted web site that triggers Cascading Style Sheets (CSS) style invalidation during a certain subtree-removal action." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2016:0664", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00014.html" }, { "name": "openSUSE-SU-2016:0684", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00018.html" }, { "name": "https://code.google.com/p/chromium/issues/detail?id=559292", "refsource": "CONFIRM", "url": "https://code.google.com/p/chromium/issues/detail?id=559292" }, { "name": "84008", "refsource": "BID", "url": "http://www.securityfocus.com/bid/84008" }, { "name": "DSA-3507", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2016/dsa-3507" }, { "name": "https://codereview.chromium.org/1556963002", "refsource": "CONFIRM", "url": "https://codereview.chromium.org/1556963002" }, { "name": "1035185", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1035185" }, { "name": "openSUSE-SU-2016:0729", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00028.html" }, { "name": "SUSE-SU-2016:0665", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00015.html" }, { "name": "GLSA-201603-09", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201603-09" }, { "name": "USN-2920-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2920-1" }, { "name": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "refsource": "CONFIRM", "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "48.0.2564.116", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2016-1634" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Use-after-free vulnerability in the StyleResolver::appendCSSStyleSheet function in WebKit/Source/core/css/resolver/StyleResolver.cpp in Blink, as used in Google Chrome before 49.0.2623.75, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted web site that triggers Cascading Style Sheets (CSS) style invalidation during a certain subtree-removal action." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ] }, "references": { "reference_data": [ { "name": "https://code.google.com/p/chromium/issues/detail?id=559292", "refsource": "CONFIRM", "tags": [], "url": "https://code.google.com/p/chromium/issues/detail?id=559292" }, { "name": "https://codereview.chromium.org/1556963002", "refsource": "CONFIRM", "tags": [], "url": "https://codereview.chromium.org/1556963002" }, { "name": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" }, { "name": "84008", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/84008" }, { "name": "DSA-3507", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2016/dsa-3507" }, { "name": "1035185", "refsource": "SECTRACK", "tags": [], "url": "http://www.securitytracker.com/id/1035185" }, { "name": "SUSE-SU-2016:0665", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00015.html" }, { "name": "openSUSE-SU-2016:0664", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00014.html" }, { "name": "GLSA-201603-09", "refsource": "GENTOO", "tags": [], "url": "https://security.gentoo.org/glsa/201603-09" }, { "name": "openSUSE-SU-2016:0684", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00018.html" }, { "name": "USN-2920-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/USN-2920-1" }, { "name": "openSUSE-SU-2016:0729", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00028.html" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": true }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9 } }, "lastModifiedDate": "2016-12-03T03:21Z", "publishedDate": "2016-03-06T02:59Z" } } }
rhsa-2016_0359
Vulnerability from csaf_redhat
Published
2016-03-07 03:22
Modified
2024-11-14 19:51
Summary
Red Hat Security Advisory: chromium-browser security update
Notes
Topic
Updated chromium-browser packages that fix multiple security issues are now
available for Red Hat Enterprise Linux 6 Supplementary.
Red Hat Product Security has rated this update as having Important security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
Details
Chromium is an open-source web browser, powered by WebKit (Blink).
Several flaws were found in the processing of malformed web content. A web
page containing malicious content could cause Chromium to crash, execute
arbitrary code, or disclose sensitive information when visited by the
victim. (CVE-2016-1630, CVE-2016-1631, CVE-2016-1632, CVE-2016-1633,
CVE-2016-1634, CVE-2016-1635, CVE-2016-1636, CVE-2016-1637, CVE-2016-1638,
CVE-2016-1639, CVE-2016-1640, CVE-2016-1641, CVE-2016-1642)
All Chromium users should upgrade to these updated packages, which
contain Chromium version 49.0.2623.75, which corrects these issues.
After installing the update, Chromium must be restarted for the changes
to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated chromium-browser packages that fix multiple security issues are now\navailable for Red Hat Enterprise Linux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having Important security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Chromium is an open-source web browser, powered by WebKit (Blink).\n\nSeveral flaws were found in the processing of malformed web content. A web\npage containing malicious content could cause Chromium to crash, execute\narbitrary code, or disclose sensitive information when visited by the\nvictim. (CVE-2016-1630, CVE-2016-1631, CVE-2016-1632, CVE-2016-1633,\nCVE-2016-1634, CVE-2016-1635, CVE-2016-1636, CVE-2016-1637, CVE-2016-1638,\nCVE-2016-1639, CVE-2016-1640, CVE-2016-1641, CVE-2016-1642)\n\nAll Chromium users should upgrade to these updated packages, which\ncontain Chromium version 49.0.2623.75, which corrects these issues.\nAfter installing the update, Chromium must be restarted for the changes\nto take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:0359", "url": "https://access.redhat.com/errata/RHSA-2016:0359" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" }, { "category": "external", "summary": "1314214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314214" }, { "category": "external", "summary": "1314215", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314215" }, { "category": "external", "summary": "1314216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314216" }, { "category": "external", "summary": "1314217", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314217" }, { "category": "external", "summary": "1314218", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314218" }, { "category": "external", "summary": "1314219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314219" }, { "category": "external", "summary": "1314220", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314220" }, { "category": "external", "summary": "1314221", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314221" }, { "category": "external", "summary": "1314222", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314222" }, { "category": "external", "summary": "1314224", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314224" }, { "category": "external", "summary": "1314225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314225" }, { "category": "external", "summary": "1314226", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314226" }, { "category": "external", "summary": "1314227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314227" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_0359.json" } ], "title": "Red Hat Security Advisory: chromium-browser security update", "tracking": { "current_release_date": "2024-11-14T19:51:03+00:00", "generator": { "date": "2024-11-14T19:51:03+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2016:0359", "initial_release_date": "2016-03-07T03:22:13+00:00", "revision_history": [ { "date": "2016-03-07T03:22:13+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-03-07T03:22:13+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T19:51:03+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.7.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.7.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.7.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "product": { "name": "chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "product_id": "chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/chromium-browser-debuginfo@49.0.2623.75-1.el6?arch=i686" } } }, { "category": "product_version", "name": "chromium-browser-0:49.0.2623.75-1.el6.i686", "product": { "name": "chromium-browser-0:49.0.2623.75-1.el6.i686", "product_id": "chromium-browser-0:49.0.2623.75-1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/chromium-browser@49.0.2623.75-1.el6?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "chromium-browser-0:49.0.2623.75-1.el6.x86_64", "product": { "name": "chromium-browser-0:49.0.2623.75-1.el6.x86_64", "product_id": "chromium-browser-0:49.0.2623.75-1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/chromium-browser@49.0.2623.75-1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "product": { "name": "chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "product_id": "chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/chromium-browser-debuginfo@49.0.2623.75-1.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:49.0.2623.75-1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686" }, "product_reference": "chromium-browser-0:49.0.2623.75-1.el6.i686", "relates_to_product_reference": "6Client-Supplementary-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:49.0.2623.75-1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64" }, "product_reference": "chromium-browser-0:49.0.2623.75-1.el6.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686" }, "product_reference": "chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "relates_to_product_reference": "6Client-Supplementary-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" }, "product_reference": "chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:49.0.2623.75-1.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686" }, "product_reference": "chromium-browser-0:49.0.2623.75-1.el6.i686", "relates_to_product_reference": "6Server-Supplementary-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:49.0.2623.75-1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64" }, "product_reference": "chromium-browser-0:49.0.2623.75-1.el6.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686" }, "product_reference": "chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "relates_to_product_reference": "6Server-Supplementary-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" }, "product_reference": "chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:49.0.2623.75-1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686" }, "product_reference": "chromium-browser-0:49.0.2623.75-1.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:49.0.2623.75-1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64" }, "product_reference": "chromium-browser-0:49.0.2623.75-1.el6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686" }, "product_reference": "chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" }, "product_reference": "chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.7.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-1630", "discovery_date": "2016-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1314214" } ], "notes": [ { "category": "description", "text": "The ContainerNode::parserRemoveChild function in WebKit/Source/core/dom/ContainerNode.cpp in Blink, as used in Google Chrome before 49.0.2623.75, mishandles widget updates, which makes it easier for remote attackers to bypass the Same Origin Policy via a crafted web site.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: same-origin bypass in Blink", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1630" }, { "category": "external", "summary": "RHBZ#1314214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314214" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1630", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1630" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1630", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1630" }, { "category": "external", "summary": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" } ], "release_date": "2016-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-03-07T03:22:13+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0359" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: same-origin bypass in Blink" }, { "cve": "CVE-2016-1631", "discovery_date": "2016-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1314215" } ], "notes": [ { "category": "description", "text": "The PPB_Flash_MessageLoop_Impl::InternalRun function in content/renderer/pepper/ppb_flash_message_loop_impl.cc in the Pepper plugin in Google Chrome before 49.0.2623.75 mishandles nested message loops, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: same-origin bypass in Pepper Plugin", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1631" }, { "category": "external", "summary": "RHBZ#1314215", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314215" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1631", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1631" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1631", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1631" }, { "category": "external", "summary": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" } ], "release_date": "2016-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-03-07T03:22:13+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0359" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: same-origin bypass in Pepper Plugin" }, { "cve": "CVE-2016-1632", "discovery_date": "2016-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1314216" } ], "notes": [ { "category": "description", "text": "The Extensions subsystem in Google Chrome before 49.0.2623.75 does not properly maintain own properties, which allows remote attackers to bypass intended access restrictions via crafted JavaScript code that triggers an incorrect cast, related to extensions/renderer/v8_helpers.h and gin/converter.h.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: bad cast in Extensions", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1632" }, { "category": "external", "summary": "RHBZ#1314216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314216" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1632", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1632" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1632", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1632" }, { "category": "external", "summary": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" } ], "release_date": "2016-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-03-07T03:22:13+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0359" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: bad cast in Extensions" }, { "cve": "CVE-2016-1633", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2016-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1314217" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in Blink, as used in Google Chrome before 49.0.2623.75, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: use-after-free in Blink", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1633" }, { "category": "external", "summary": "RHBZ#1314217", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314217" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1633", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1633" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1633", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1633" }, { "category": "external", "summary": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" } ], "release_date": "2016-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-03-07T03:22:13+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0359" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: use-after-free in Blink" }, { "cve": "CVE-2016-1634", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2016-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1314218" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in the StyleResolver::appendCSSStyleSheet function in WebKit/Source/core/css/resolver/StyleResolver.cpp in Blink, as used in Google Chrome before 49.0.2623.75, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted web site that triggers Cascading Style Sheets (CSS) style invalidation during a certain subtree-removal action.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: use-after-free in Blink", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1634" }, { "category": "external", "summary": "RHBZ#1314218", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314218" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1634", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1634" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1634", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1634" }, { "category": "external", "summary": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" } ], "release_date": "2016-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-03-07T03:22:13+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0359" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: use-after-free in Blink" }, { "cve": "CVE-2016-1635", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2016-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1314219" } ], "notes": [ { "category": "description", "text": "extensions/renderer/render_frame_observer_natives.cc in Google Chrome before 49.0.2623.75 does not properly consider object lifetimes and re-entrancy issues during OnDocumentElementCreated handling, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: use-after-free in Blink", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1635" }, { "category": "external", "summary": "RHBZ#1314219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314219" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1635", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1635" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1635", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1635" }, { "category": "external", "summary": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" } ], "release_date": "2016-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-03-07T03:22:13+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0359" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: use-after-free in Blink" }, { "cve": "CVE-2016-1636", "discovery_date": "2016-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1314220" } ], "notes": [ { "category": "description", "text": "The PendingScript::notifyFinished function in WebKit/Source/core/dom/PendingScript.cpp in Google Chrome before 49.0.2623.75 relies on memory-cache information about integrity-check occurrences instead of integrity-check successes, which allows remote attackers to bypass the Subresource Integrity (aka SRI) protection mechanism by triggering two loads of the same resource.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: SRI Validation Bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1636" }, { "category": "external", "summary": "RHBZ#1314220", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314220" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1636", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1636" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1636", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1636" }, { "category": "external", "summary": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" } ], "release_date": "2016-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-03-07T03:22:13+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0359" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: SRI Validation Bypass" }, { "cve": "CVE-2016-1637", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2016-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1314221" } ], "notes": [ { "category": "description", "text": "The SkATan2_255 function in effects/gradients/SkSweepGradient.cpp in Skia, as used in Google Chrome before 49.0.2623.75, mishandles arctangent calculations, which allows remote attackers to obtain sensitive information via a crafted web site.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: information leak in Skia", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1637" }, { "category": "external", "summary": "RHBZ#1314221", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314221" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1637", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1637" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1637", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1637" }, { "category": "external", "summary": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" } ], "release_date": "2016-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-03-07T03:22:13+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0359" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: information leak in Skia" }, { "cve": "CVE-2016-1638", "discovery_date": "2016-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1314222" } ], "notes": [ { "category": "description", "text": "extensions/renderer/resources/platform_app.js in the Extensions subsystem in Google Chrome before 49.0.2623.75 does not properly restrict use of Web APIs, which allows remote attackers to bypass intended access restrictions via a crafted platform app.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: WebAPI Bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1638" }, { "category": "external", "summary": "RHBZ#1314222", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314222" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1638", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1638" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1638", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1638" }, { "category": "external", "summary": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" } ], "release_date": "2016-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-03-07T03:22:13+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0359" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: WebAPI Bypass" }, { "cve": "CVE-2016-1639", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2016-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1314224" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in browser/extensions/api/webrtc_audio_private/webrtc_audio_private_api.cc in the WebRTC Audio Private API implementation in Google Chrome before 49.0.2623.75 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging incorrect reliance on the resource context pointer.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: use-after-free in WebRTC", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1639" }, { "category": "external", "summary": "RHBZ#1314224", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314224" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1639", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1639" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1639", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1639" }, { "category": "external", "summary": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" } ], "release_date": "2016-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-03-07T03:22:13+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0359" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: use-after-free in WebRTC" }, { "cve": "CVE-2016-1640", "discovery_date": "2016-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1314225" } ], "notes": [ { "category": "description", "text": "The Web Store inline-installer implementation in the Extensions UI in Google Chrome before 49.0.2623.75 does not block installations upon deletion of an installation frame, which makes it easier for remote attackers to trick a user into believing that an installation request originated from the user\u0027s next navigation target via a crafted web site.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: origin confusion in Extensions UI", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1640" }, { "category": "external", "summary": "RHBZ#1314225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314225" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1640", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1640" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1640", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1640" }, { "category": "external", "summary": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" } ], "release_date": "2016-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-03-07T03:22:13+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0359" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: origin confusion in Extensions UI" }, { "cve": "CVE-2016-1641", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2016-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1314226" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in content/browser/web_contents/web_contents_impl.cc in Google Chrome before 49.0.2623.75 allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering an image download after a certain data structure is deleted, as demonstrated by a favicon.ico download.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: use-after-free in Favicon", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1641" }, { "category": "external", "summary": "RHBZ#1314226", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314226" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1641", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1641" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1641", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1641" }, { "category": "external", "summary": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" } ], "release_date": "2016-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-03-07T03:22:13+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0359" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: use-after-free in Favicon" }, { "cve": "CVE-2016-1642", "discovery_date": "2016-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1314227" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in Google Chrome before 49.0.2623.75 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: various fixes from internal audits", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1642" }, { "category": "external", "summary": "RHBZ#1314227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1642", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1642" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1642", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1642" }, { "category": "external", "summary": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" } ], "release_date": "2016-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-03-07T03:22:13+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0359" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: various fixes from internal audits" }, { "cve": "CVE-2016-2843", "discovery_date": "2016-03-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1315359" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in Google V8 before 4.9.385.26, as used in Google Chrome before 49.0.2623.75, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Multiple unspecified vulnerabilities in V8 before 4.9.385.26", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2843" }, { "category": "external", "summary": "RHBZ#1315359", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1315359" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2843", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2843" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2843", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2843" }, { "category": "external", "summary": "http://googlechromereleases.blogspot.cz/2016/03/stable-channel-update.html", "url": "http://googlechromereleases.blogspot.cz/2016/03/stable-channel-update.html" } ], "release_date": "2016-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-03-07T03:22:13+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0359" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: Multiple unspecified vulnerabilities in V8 before 4.9.385.26" }, { "cve": "CVE-2016-2844", "discovery_date": "2016-03-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1315361" } ], "notes": [ { "category": "description", "text": "WebKit/Source/core/layout/LayoutBlock.cpp in Blink, as used in Google Chrome before 49.0.2623.75, does not properly determine when anonymous block wrappers may exist, which allows remote attackers to cause a denial of service (incorrect cast and assertion failure) or possibly have unspecified other impact via crafted JavaScript code.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: LayoutBlock.cpp in Blink does not properly determine when anonymous block wrappers may exist", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2844" }, { "category": "external", "summary": "RHBZ#1315361", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1315361" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2844", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2844" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2844", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2844" }, { "category": "external", "summary": "https://codereview.chromium.org/1423573002", "url": "https://codereview.chromium.org/1423573002" } ], "release_date": "2015-10-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-03-07T03:22:13+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0359" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: LayoutBlock.cpp in Blink does not properly determine when anonymous block wrappers may exist" }, { "cve": "CVE-2016-2845", "discovery_date": "2016-03-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1315362" } ], "notes": [ { "category": "description", "text": "The Content Security Policy (CSP) implementation in Blink, as used in Google Chrome before 49.0.2623.75, does not ignore a URL\u0027s path component in the case of a ServiceWorker fetch, which allows remote attackers to obtain sensitive information about visited web pages by reading CSP violation reports, related to FrameFetchContext.cpp and ResourceFetcher.cpp.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: CSP implementation in Blink does not ignore a URL\u0027s path component in the case of a ServiceWorker fetch", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2845" }, { "category": "external", "summary": "RHBZ#1315362", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1315362" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2845", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2845" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2845", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2845" }, { "category": "external", "summary": "https://codereview.chromium.org/1454003003/", "url": "https://codereview.chromium.org/1454003003/" } ], "release_date": "2015-11-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-03-07T03:22:13+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0359" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: CSP implementation in Blink does not ignore a URL\u0027s path component in the case of a ServiceWorker fetch" } ] }
rhsa-2016:0359
Vulnerability from csaf_redhat
Published
2016-03-07 03:22
Modified
2024-11-14 19:51
Summary
Red Hat Security Advisory: chromium-browser security update
Notes
Topic
Updated chromium-browser packages that fix multiple security issues are now
available for Red Hat Enterprise Linux 6 Supplementary.
Red Hat Product Security has rated this update as having Important security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
Details
Chromium is an open-source web browser, powered by WebKit (Blink).
Several flaws were found in the processing of malformed web content. A web
page containing malicious content could cause Chromium to crash, execute
arbitrary code, or disclose sensitive information when visited by the
victim. (CVE-2016-1630, CVE-2016-1631, CVE-2016-1632, CVE-2016-1633,
CVE-2016-1634, CVE-2016-1635, CVE-2016-1636, CVE-2016-1637, CVE-2016-1638,
CVE-2016-1639, CVE-2016-1640, CVE-2016-1641, CVE-2016-1642)
All Chromium users should upgrade to these updated packages, which
contain Chromium version 49.0.2623.75, which corrects these issues.
After installing the update, Chromium must be restarted for the changes
to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated chromium-browser packages that fix multiple security issues are now\navailable for Red Hat Enterprise Linux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having Important security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Chromium is an open-source web browser, powered by WebKit (Blink).\n\nSeveral flaws were found in the processing of malformed web content. A web\npage containing malicious content could cause Chromium to crash, execute\narbitrary code, or disclose sensitive information when visited by the\nvictim. (CVE-2016-1630, CVE-2016-1631, CVE-2016-1632, CVE-2016-1633,\nCVE-2016-1634, CVE-2016-1635, CVE-2016-1636, CVE-2016-1637, CVE-2016-1638,\nCVE-2016-1639, CVE-2016-1640, CVE-2016-1641, CVE-2016-1642)\n\nAll Chromium users should upgrade to these updated packages, which\ncontain Chromium version 49.0.2623.75, which corrects these issues.\nAfter installing the update, Chromium must be restarted for the changes\nto take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:0359", "url": "https://access.redhat.com/errata/RHSA-2016:0359" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" }, { "category": "external", "summary": "1314214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314214" }, { "category": "external", "summary": "1314215", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314215" }, { "category": "external", "summary": "1314216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314216" }, { "category": "external", "summary": "1314217", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314217" }, { "category": "external", "summary": "1314218", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314218" }, { "category": "external", "summary": "1314219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314219" }, { "category": "external", "summary": "1314220", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314220" }, { "category": "external", "summary": "1314221", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314221" }, { "category": "external", "summary": "1314222", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314222" }, { "category": "external", "summary": "1314224", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314224" }, { "category": "external", "summary": "1314225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314225" }, { "category": "external", "summary": "1314226", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314226" }, { "category": "external", "summary": "1314227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314227" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_0359.json" } ], "title": "Red Hat Security Advisory: chromium-browser security update", "tracking": { "current_release_date": "2024-11-14T19:51:03+00:00", "generator": { "date": "2024-11-14T19:51:03+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2016:0359", "initial_release_date": "2016-03-07T03:22:13+00:00", "revision_history": [ { "date": "2016-03-07T03:22:13+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-03-07T03:22:13+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T19:51:03+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.7.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.7.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.7.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "product": { "name": "chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "product_id": "chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/chromium-browser-debuginfo@49.0.2623.75-1.el6?arch=i686" } } }, { "category": "product_version", "name": "chromium-browser-0:49.0.2623.75-1.el6.i686", "product": { "name": "chromium-browser-0:49.0.2623.75-1.el6.i686", "product_id": "chromium-browser-0:49.0.2623.75-1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/chromium-browser@49.0.2623.75-1.el6?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "chromium-browser-0:49.0.2623.75-1.el6.x86_64", "product": { "name": "chromium-browser-0:49.0.2623.75-1.el6.x86_64", "product_id": "chromium-browser-0:49.0.2623.75-1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/chromium-browser@49.0.2623.75-1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "product": { "name": "chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "product_id": "chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/chromium-browser-debuginfo@49.0.2623.75-1.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:49.0.2623.75-1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686" }, "product_reference": "chromium-browser-0:49.0.2623.75-1.el6.i686", "relates_to_product_reference": "6Client-Supplementary-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:49.0.2623.75-1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64" }, "product_reference": "chromium-browser-0:49.0.2623.75-1.el6.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686" }, "product_reference": "chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "relates_to_product_reference": "6Client-Supplementary-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" }, "product_reference": "chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:49.0.2623.75-1.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686" }, "product_reference": "chromium-browser-0:49.0.2623.75-1.el6.i686", "relates_to_product_reference": "6Server-Supplementary-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:49.0.2623.75-1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64" }, "product_reference": "chromium-browser-0:49.0.2623.75-1.el6.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686" }, "product_reference": "chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "relates_to_product_reference": "6Server-Supplementary-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" }, "product_reference": "chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:49.0.2623.75-1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686" }, "product_reference": "chromium-browser-0:49.0.2623.75-1.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:49.0.2623.75-1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64" }, "product_reference": "chromium-browser-0:49.0.2623.75-1.el6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686" }, "product_reference": "chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" }, "product_reference": "chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.7.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-1630", "discovery_date": "2016-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1314214" } ], "notes": [ { "category": "description", "text": "The ContainerNode::parserRemoveChild function in WebKit/Source/core/dom/ContainerNode.cpp in Blink, as used in Google Chrome before 49.0.2623.75, mishandles widget updates, which makes it easier for remote attackers to bypass the Same Origin Policy via a crafted web site.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: same-origin bypass in Blink", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1630" }, { "category": "external", "summary": "RHBZ#1314214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314214" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1630", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1630" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1630", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1630" }, { "category": "external", "summary": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" } ], "release_date": "2016-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-03-07T03:22:13+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0359" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: same-origin bypass in Blink" }, { "cve": "CVE-2016-1631", "discovery_date": "2016-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1314215" } ], "notes": [ { "category": "description", "text": "The PPB_Flash_MessageLoop_Impl::InternalRun function in content/renderer/pepper/ppb_flash_message_loop_impl.cc in the Pepper plugin in Google Chrome before 49.0.2623.75 mishandles nested message loops, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: same-origin bypass in Pepper Plugin", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1631" }, { "category": "external", "summary": "RHBZ#1314215", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314215" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1631", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1631" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1631", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1631" }, { "category": "external", "summary": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" } ], "release_date": "2016-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-03-07T03:22:13+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0359" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: same-origin bypass in Pepper Plugin" }, { "cve": "CVE-2016-1632", "discovery_date": "2016-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1314216" } ], "notes": [ { "category": "description", "text": "The Extensions subsystem in Google Chrome before 49.0.2623.75 does not properly maintain own properties, which allows remote attackers to bypass intended access restrictions via crafted JavaScript code that triggers an incorrect cast, related to extensions/renderer/v8_helpers.h and gin/converter.h.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: bad cast in Extensions", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1632" }, { "category": "external", "summary": "RHBZ#1314216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314216" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1632", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1632" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1632", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1632" }, { "category": "external", "summary": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" } ], "release_date": "2016-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-03-07T03:22:13+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0359" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: bad cast in Extensions" }, { "cve": "CVE-2016-1633", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2016-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1314217" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in Blink, as used in Google Chrome before 49.0.2623.75, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: use-after-free in Blink", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1633" }, { "category": "external", "summary": "RHBZ#1314217", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314217" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1633", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1633" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1633", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1633" }, { "category": "external", "summary": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" } ], "release_date": "2016-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-03-07T03:22:13+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0359" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: use-after-free in Blink" }, { "cve": "CVE-2016-1634", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2016-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1314218" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in the StyleResolver::appendCSSStyleSheet function in WebKit/Source/core/css/resolver/StyleResolver.cpp in Blink, as used in Google Chrome before 49.0.2623.75, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted web site that triggers Cascading Style Sheets (CSS) style invalidation during a certain subtree-removal action.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: use-after-free in Blink", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1634" }, { "category": "external", "summary": "RHBZ#1314218", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314218" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1634", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1634" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1634", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1634" }, { "category": "external", "summary": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" } ], "release_date": "2016-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-03-07T03:22:13+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0359" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: use-after-free in Blink" }, { "cve": "CVE-2016-1635", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2016-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1314219" } ], "notes": [ { "category": "description", "text": "extensions/renderer/render_frame_observer_natives.cc in Google Chrome before 49.0.2623.75 does not properly consider object lifetimes and re-entrancy issues during OnDocumentElementCreated handling, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: use-after-free in Blink", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1635" }, { "category": "external", "summary": "RHBZ#1314219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314219" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1635", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1635" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1635", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1635" }, { "category": "external", "summary": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" } ], "release_date": "2016-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-03-07T03:22:13+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0359" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: use-after-free in Blink" }, { "cve": "CVE-2016-1636", "discovery_date": "2016-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1314220" } ], "notes": [ { "category": "description", "text": "The PendingScript::notifyFinished function in WebKit/Source/core/dom/PendingScript.cpp in Google Chrome before 49.0.2623.75 relies on memory-cache information about integrity-check occurrences instead of integrity-check successes, which allows remote attackers to bypass the Subresource Integrity (aka SRI) protection mechanism by triggering two loads of the same resource.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: SRI Validation Bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1636" }, { "category": "external", "summary": "RHBZ#1314220", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314220" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1636", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1636" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1636", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1636" }, { "category": "external", "summary": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" } ], "release_date": "2016-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-03-07T03:22:13+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0359" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: SRI Validation Bypass" }, { "cve": "CVE-2016-1637", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2016-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1314221" } ], "notes": [ { "category": "description", "text": "The SkATan2_255 function in effects/gradients/SkSweepGradient.cpp in Skia, as used in Google Chrome before 49.0.2623.75, mishandles arctangent calculations, which allows remote attackers to obtain sensitive information via a crafted web site.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: information leak in Skia", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1637" }, { "category": "external", "summary": "RHBZ#1314221", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314221" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1637", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1637" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1637", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1637" }, { "category": "external", "summary": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" } ], "release_date": "2016-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-03-07T03:22:13+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0359" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: information leak in Skia" }, { "cve": "CVE-2016-1638", "discovery_date": "2016-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1314222" } ], "notes": [ { "category": "description", "text": "extensions/renderer/resources/platform_app.js in the Extensions subsystem in Google Chrome before 49.0.2623.75 does not properly restrict use of Web APIs, which allows remote attackers to bypass intended access restrictions via a crafted platform app.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: WebAPI Bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1638" }, { "category": "external", "summary": "RHBZ#1314222", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314222" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1638", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1638" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1638", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1638" }, { "category": "external", "summary": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" } ], "release_date": "2016-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-03-07T03:22:13+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0359" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: WebAPI Bypass" }, { "cve": "CVE-2016-1639", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2016-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1314224" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in browser/extensions/api/webrtc_audio_private/webrtc_audio_private_api.cc in the WebRTC Audio Private API implementation in Google Chrome before 49.0.2623.75 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging incorrect reliance on the resource context pointer.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: use-after-free in WebRTC", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1639" }, { "category": "external", "summary": "RHBZ#1314224", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314224" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1639", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1639" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1639", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1639" }, { "category": "external", "summary": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" } ], "release_date": "2016-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-03-07T03:22:13+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0359" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: use-after-free in WebRTC" }, { "cve": "CVE-2016-1640", "discovery_date": "2016-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1314225" } ], "notes": [ { "category": "description", "text": "The Web Store inline-installer implementation in the Extensions UI in Google Chrome before 49.0.2623.75 does not block installations upon deletion of an installation frame, which makes it easier for remote attackers to trick a user into believing that an installation request originated from the user\u0027s next navigation target via a crafted web site.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: origin confusion in Extensions UI", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1640" }, { "category": "external", "summary": "RHBZ#1314225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314225" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1640", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1640" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1640", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1640" }, { "category": "external", "summary": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" } ], "release_date": "2016-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-03-07T03:22:13+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0359" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: origin confusion in Extensions UI" }, { "cve": "CVE-2016-1641", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2016-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1314226" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in content/browser/web_contents/web_contents_impl.cc in Google Chrome before 49.0.2623.75 allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering an image download after a certain data structure is deleted, as demonstrated by a favicon.ico download.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: use-after-free in Favicon", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1641" }, { "category": "external", "summary": "RHBZ#1314226", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314226" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1641", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1641" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1641", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1641" }, { "category": "external", "summary": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" } ], "release_date": "2016-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-03-07T03:22:13+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0359" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: use-after-free in Favicon" }, { "cve": "CVE-2016-1642", "discovery_date": "2016-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1314227" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in Google Chrome before 49.0.2623.75 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: various fixes from internal audits", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1642" }, { "category": "external", "summary": "RHBZ#1314227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1642", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1642" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1642", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1642" }, { "category": "external", "summary": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" } ], "release_date": "2016-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-03-07T03:22:13+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0359" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: various fixes from internal audits" }, { "cve": "CVE-2016-2843", "discovery_date": "2016-03-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1315359" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in Google V8 before 4.9.385.26, as used in Google Chrome before 49.0.2623.75, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Multiple unspecified vulnerabilities in V8 before 4.9.385.26", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2843" }, { "category": "external", "summary": "RHBZ#1315359", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1315359" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2843", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2843" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2843", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2843" }, { "category": "external", "summary": "http://googlechromereleases.blogspot.cz/2016/03/stable-channel-update.html", "url": "http://googlechromereleases.blogspot.cz/2016/03/stable-channel-update.html" } ], "release_date": "2016-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-03-07T03:22:13+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0359" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: Multiple unspecified vulnerabilities in V8 before 4.9.385.26" }, { "cve": "CVE-2016-2844", "discovery_date": "2016-03-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1315361" } ], "notes": [ { "category": "description", "text": "WebKit/Source/core/layout/LayoutBlock.cpp in Blink, as used in Google Chrome before 49.0.2623.75, does not properly determine when anonymous block wrappers may exist, which allows remote attackers to cause a denial of service (incorrect cast and assertion failure) or possibly have unspecified other impact via crafted JavaScript code.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: LayoutBlock.cpp in Blink does not properly determine when anonymous block wrappers may exist", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2844" }, { "category": "external", "summary": "RHBZ#1315361", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1315361" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2844", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2844" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2844", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2844" }, { "category": "external", "summary": "https://codereview.chromium.org/1423573002", "url": "https://codereview.chromium.org/1423573002" } ], "release_date": "2015-10-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-03-07T03:22:13+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0359" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: LayoutBlock.cpp in Blink does not properly determine when anonymous block wrappers may exist" }, { "cve": "CVE-2016-2845", "discovery_date": "2016-03-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1315362" } ], "notes": [ { "category": "description", "text": "The Content Security Policy (CSP) implementation in Blink, as used in Google Chrome before 49.0.2623.75, does not ignore a URL\u0027s path component in the case of a ServiceWorker fetch, which allows remote attackers to obtain sensitive information about visited web pages by reading CSP violation reports, related to FrameFetchContext.cpp and ResourceFetcher.cpp.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: CSP implementation in Blink does not ignore a URL\u0027s path component in the case of a ServiceWorker fetch", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2845" }, { "category": "external", "summary": "RHBZ#1315362", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1315362" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2845", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2845" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2845", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2845" }, { "category": "external", "summary": "https://codereview.chromium.org/1454003003/", "url": "https://codereview.chromium.org/1454003003/" } ], "release_date": "2015-11-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-03-07T03:22:13+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0359" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: CSP implementation in Blink does not ignore a URL\u0027s path component in the case of a ServiceWorker fetch" } ] }
RHSA-2016:0359
Vulnerability from csaf_redhat
Published
2016-03-07 03:22
Modified
2024-11-14 19:51
Summary
Red Hat Security Advisory: chromium-browser security update
Notes
Topic
Updated chromium-browser packages that fix multiple security issues are now
available for Red Hat Enterprise Linux 6 Supplementary.
Red Hat Product Security has rated this update as having Important security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
Details
Chromium is an open-source web browser, powered by WebKit (Blink).
Several flaws were found in the processing of malformed web content. A web
page containing malicious content could cause Chromium to crash, execute
arbitrary code, or disclose sensitive information when visited by the
victim. (CVE-2016-1630, CVE-2016-1631, CVE-2016-1632, CVE-2016-1633,
CVE-2016-1634, CVE-2016-1635, CVE-2016-1636, CVE-2016-1637, CVE-2016-1638,
CVE-2016-1639, CVE-2016-1640, CVE-2016-1641, CVE-2016-1642)
All Chromium users should upgrade to these updated packages, which
contain Chromium version 49.0.2623.75, which corrects these issues.
After installing the update, Chromium must be restarted for the changes
to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated chromium-browser packages that fix multiple security issues are now\navailable for Red Hat Enterprise Linux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having Important security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Chromium is an open-source web browser, powered by WebKit (Blink).\n\nSeveral flaws were found in the processing of malformed web content. A web\npage containing malicious content could cause Chromium to crash, execute\narbitrary code, or disclose sensitive information when visited by the\nvictim. (CVE-2016-1630, CVE-2016-1631, CVE-2016-1632, CVE-2016-1633,\nCVE-2016-1634, CVE-2016-1635, CVE-2016-1636, CVE-2016-1637, CVE-2016-1638,\nCVE-2016-1639, CVE-2016-1640, CVE-2016-1641, CVE-2016-1642)\n\nAll Chromium users should upgrade to these updated packages, which\ncontain Chromium version 49.0.2623.75, which corrects these issues.\nAfter installing the update, Chromium must be restarted for the changes\nto take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:0359", "url": "https://access.redhat.com/errata/RHSA-2016:0359" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" }, { "category": "external", "summary": "1314214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314214" }, { "category": "external", "summary": "1314215", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314215" }, { "category": "external", "summary": "1314216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314216" }, { "category": "external", "summary": "1314217", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314217" }, { "category": "external", "summary": "1314218", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314218" }, { "category": "external", "summary": "1314219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314219" }, { "category": "external", "summary": "1314220", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314220" }, { "category": "external", "summary": "1314221", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314221" }, { "category": "external", "summary": "1314222", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314222" }, { "category": "external", "summary": "1314224", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314224" }, { "category": "external", "summary": "1314225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314225" }, { "category": "external", "summary": "1314226", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314226" }, { "category": "external", "summary": "1314227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314227" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_0359.json" } ], "title": "Red Hat Security Advisory: chromium-browser security update", "tracking": { "current_release_date": "2024-11-14T19:51:03+00:00", "generator": { "date": "2024-11-14T19:51:03+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2016:0359", "initial_release_date": "2016-03-07T03:22:13+00:00", "revision_history": [ { "date": "2016-03-07T03:22:13+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-03-07T03:22:13+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T19:51:03+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.7.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.7.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.7.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "product": { "name": "chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "product_id": "chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/chromium-browser-debuginfo@49.0.2623.75-1.el6?arch=i686" } } }, { "category": "product_version", "name": "chromium-browser-0:49.0.2623.75-1.el6.i686", "product": { "name": "chromium-browser-0:49.0.2623.75-1.el6.i686", "product_id": "chromium-browser-0:49.0.2623.75-1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/chromium-browser@49.0.2623.75-1.el6?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "chromium-browser-0:49.0.2623.75-1.el6.x86_64", "product": { "name": "chromium-browser-0:49.0.2623.75-1.el6.x86_64", "product_id": "chromium-browser-0:49.0.2623.75-1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/chromium-browser@49.0.2623.75-1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "product": { "name": "chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "product_id": "chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/chromium-browser-debuginfo@49.0.2623.75-1.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:49.0.2623.75-1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686" }, "product_reference": "chromium-browser-0:49.0.2623.75-1.el6.i686", "relates_to_product_reference": "6Client-Supplementary-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:49.0.2623.75-1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64" }, "product_reference": "chromium-browser-0:49.0.2623.75-1.el6.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686" }, "product_reference": "chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "relates_to_product_reference": "6Client-Supplementary-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" }, "product_reference": "chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:49.0.2623.75-1.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686" }, "product_reference": "chromium-browser-0:49.0.2623.75-1.el6.i686", "relates_to_product_reference": "6Server-Supplementary-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:49.0.2623.75-1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64" }, "product_reference": "chromium-browser-0:49.0.2623.75-1.el6.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686" }, "product_reference": "chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "relates_to_product_reference": "6Server-Supplementary-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" }, "product_reference": "chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:49.0.2623.75-1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686" }, "product_reference": "chromium-browser-0:49.0.2623.75-1.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:49.0.2623.75-1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64" }, "product_reference": "chromium-browser-0:49.0.2623.75-1.el6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686" }, "product_reference": "chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" }, "product_reference": "chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.7.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-1630", "discovery_date": "2016-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1314214" } ], "notes": [ { "category": "description", "text": "The ContainerNode::parserRemoveChild function in WebKit/Source/core/dom/ContainerNode.cpp in Blink, as used in Google Chrome before 49.0.2623.75, mishandles widget updates, which makes it easier for remote attackers to bypass the Same Origin Policy via a crafted web site.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: same-origin bypass in Blink", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1630" }, { "category": "external", "summary": "RHBZ#1314214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314214" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1630", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1630" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1630", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1630" }, { "category": "external", "summary": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" } ], "release_date": "2016-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-03-07T03:22:13+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0359" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: same-origin bypass in Blink" }, { "cve": "CVE-2016-1631", "discovery_date": "2016-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1314215" } ], "notes": [ { "category": "description", "text": "The PPB_Flash_MessageLoop_Impl::InternalRun function in content/renderer/pepper/ppb_flash_message_loop_impl.cc in the Pepper plugin in Google Chrome before 49.0.2623.75 mishandles nested message loops, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: same-origin bypass in Pepper Plugin", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1631" }, { "category": "external", "summary": "RHBZ#1314215", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314215" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1631", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1631" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1631", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1631" }, { "category": "external", "summary": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" } ], "release_date": "2016-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-03-07T03:22:13+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0359" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: same-origin bypass in Pepper Plugin" }, { "cve": "CVE-2016-1632", "discovery_date": "2016-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1314216" } ], "notes": [ { "category": "description", "text": "The Extensions subsystem in Google Chrome before 49.0.2623.75 does not properly maintain own properties, which allows remote attackers to bypass intended access restrictions via crafted JavaScript code that triggers an incorrect cast, related to extensions/renderer/v8_helpers.h and gin/converter.h.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: bad cast in Extensions", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1632" }, { "category": "external", "summary": "RHBZ#1314216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314216" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1632", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1632" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1632", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1632" }, { "category": "external", "summary": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" } ], "release_date": "2016-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-03-07T03:22:13+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0359" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: bad cast in Extensions" }, { "cve": "CVE-2016-1633", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2016-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1314217" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in Blink, as used in Google Chrome before 49.0.2623.75, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: use-after-free in Blink", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1633" }, { "category": "external", "summary": "RHBZ#1314217", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314217" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1633", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1633" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1633", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1633" }, { "category": "external", "summary": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" } ], "release_date": "2016-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-03-07T03:22:13+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0359" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: use-after-free in Blink" }, { "cve": "CVE-2016-1634", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2016-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1314218" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in the StyleResolver::appendCSSStyleSheet function in WebKit/Source/core/css/resolver/StyleResolver.cpp in Blink, as used in Google Chrome before 49.0.2623.75, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted web site that triggers Cascading Style Sheets (CSS) style invalidation during a certain subtree-removal action.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: use-after-free in Blink", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1634" }, { "category": "external", "summary": "RHBZ#1314218", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314218" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1634", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1634" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1634", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1634" }, { "category": "external", "summary": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" } ], "release_date": "2016-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-03-07T03:22:13+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0359" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: use-after-free in Blink" }, { "cve": "CVE-2016-1635", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2016-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1314219" } ], "notes": [ { "category": "description", "text": "extensions/renderer/render_frame_observer_natives.cc in Google Chrome before 49.0.2623.75 does not properly consider object lifetimes and re-entrancy issues during OnDocumentElementCreated handling, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: use-after-free in Blink", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1635" }, { "category": "external", "summary": "RHBZ#1314219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314219" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1635", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1635" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1635", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1635" }, { "category": "external", "summary": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" } ], "release_date": "2016-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-03-07T03:22:13+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0359" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: use-after-free in Blink" }, { "cve": "CVE-2016-1636", "discovery_date": "2016-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1314220" } ], "notes": [ { "category": "description", "text": "The PendingScript::notifyFinished function in WebKit/Source/core/dom/PendingScript.cpp in Google Chrome before 49.0.2623.75 relies on memory-cache information about integrity-check occurrences instead of integrity-check successes, which allows remote attackers to bypass the Subresource Integrity (aka SRI) protection mechanism by triggering two loads of the same resource.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: SRI Validation Bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1636" }, { "category": "external", "summary": "RHBZ#1314220", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314220" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1636", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1636" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1636", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1636" }, { "category": "external", "summary": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" } ], "release_date": "2016-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-03-07T03:22:13+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0359" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: SRI Validation Bypass" }, { "cve": "CVE-2016-1637", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2016-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1314221" } ], "notes": [ { "category": "description", "text": "The SkATan2_255 function in effects/gradients/SkSweepGradient.cpp in Skia, as used in Google Chrome before 49.0.2623.75, mishandles arctangent calculations, which allows remote attackers to obtain sensitive information via a crafted web site.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: information leak in Skia", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1637" }, { "category": "external", "summary": "RHBZ#1314221", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314221" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1637", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1637" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1637", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1637" }, { "category": "external", "summary": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" } ], "release_date": "2016-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-03-07T03:22:13+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0359" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: information leak in Skia" }, { "cve": "CVE-2016-1638", "discovery_date": "2016-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1314222" } ], "notes": [ { "category": "description", "text": "extensions/renderer/resources/platform_app.js in the Extensions subsystem in Google Chrome before 49.0.2623.75 does not properly restrict use of Web APIs, which allows remote attackers to bypass intended access restrictions via a crafted platform app.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: WebAPI Bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1638" }, { "category": "external", "summary": "RHBZ#1314222", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314222" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1638", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1638" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1638", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1638" }, { "category": "external", "summary": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" } ], "release_date": "2016-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-03-07T03:22:13+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0359" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: WebAPI Bypass" }, { "cve": "CVE-2016-1639", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2016-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1314224" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in browser/extensions/api/webrtc_audio_private/webrtc_audio_private_api.cc in the WebRTC Audio Private API implementation in Google Chrome before 49.0.2623.75 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging incorrect reliance on the resource context pointer.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: use-after-free in WebRTC", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1639" }, { "category": "external", "summary": "RHBZ#1314224", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314224" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1639", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1639" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1639", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1639" }, { "category": "external", "summary": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" } ], "release_date": "2016-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-03-07T03:22:13+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0359" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: use-after-free in WebRTC" }, { "cve": "CVE-2016-1640", "discovery_date": "2016-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1314225" } ], "notes": [ { "category": "description", "text": "The Web Store inline-installer implementation in the Extensions UI in Google Chrome before 49.0.2623.75 does not block installations upon deletion of an installation frame, which makes it easier for remote attackers to trick a user into believing that an installation request originated from the user\u0027s next navigation target via a crafted web site.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: origin confusion in Extensions UI", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1640" }, { "category": "external", "summary": "RHBZ#1314225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314225" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1640", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1640" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1640", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1640" }, { "category": "external", "summary": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" } ], "release_date": "2016-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-03-07T03:22:13+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0359" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: origin confusion in Extensions UI" }, { "cve": "CVE-2016-1641", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2016-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1314226" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in content/browser/web_contents/web_contents_impl.cc in Google Chrome before 49.0.2623.75 allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering an image download after a certain data structure is deleted, as demonstrated by a favicon.ico download.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: use-after-free in Favicon", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1641" }, { "category": "external", "summary": "RHBZ#1314226", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314226" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1641", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1641" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1641", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1641" }, { "category": "external", "summary": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" } ], "release_date": "2016-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-03-07T03:22:13+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0359" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: use-after-free in Favicon" }, { "cve": "CVE-2016-1642", "discovery_date": "2016-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1314227" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in Google Chrome before 49.0.2623.75 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: various fixes from internal audits", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1642" }, { "category": "external", "summary": "RHBZ#1314227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1642", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1642" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1642", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1642" }, { "category": "external", "summary": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" } ], "release_date": "2016-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-03-07T03:22:13+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0359" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: various fixes from internal audits" }, { "cve": "CVE-2016-2843", "discovery_date": "2016-03-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1315359" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in Google V8 before 4.9.385.26, as used in Google Chrome before 49.0.2623.75, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Multiple unspecified vulnerabilities in V8 before 4.9.385.26", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2843" }, { "category": "external", "summary": "RHBZ#1315359", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1315359" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2843", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2843" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2843", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2843" }, { "category": "external", "summary": "http://googlechromereleases.blogspot.cz/2016/03/stable-channel-update.html", "url": "http://googlechromereleases.blogspot.cz/2016/03/stable-channel-update.html" } ], "release_date": "2016-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-03-07T03:22:13+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0359" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: Multiple unspecified vulnerabilities in V8 before 4.9.385.26" }, { "cve": "CVE-2016-2844", "discovery_date": "2016-03-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1315361" } ], "notes": [ { "category": "description", "text": "WebKit/Source/core/layout/LayoutBlock.cpp in Blink, as used in Google Chrome before 49.0.2623.75, does not properly determine when anonymous block wrappers may exist, which allows remote attackers to cause a denial of service (incorrect cast and assertion failure) or possibly have unspecified other impact via crafted JavaScript code.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: LayoutBlock.cpp in Blink does not properly determine when anonymous block wrappers may exist", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2844" }, { "category": "external", "summary": "RHBZ#1315361", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1315361" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2844", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2844" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2844", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2844" }, { "category": "external", "summary": "https://codereview.chromium.org/1423573002", "url": "https://codereview.chromium.org/1423573002" } ], "release_date": "2015-10-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-03-07T03:22:13+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0359" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: LayoutBlock.cpp in Blink does not properly determine when anonymous block wrappers may exist" }, { "cve": "CVE-2016-2845", "discovery_date": "2016-03-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1315362" } ], "notes": [ { "category": "description", "text": "The Content Security Policy (CSP) implementation in Blink, as used in Google Chrome before 49.0.2623.75, does not ignore a URL\u0027s path component in the case of a ServiceWorker fetch, which allows remote attackers to obtain sensitive information about visited web pages by reading CSP violation reports, related to FrameFetchContext.cpp and ResourceFetcher.cpp.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: CSP implementation in Blink does not ignore a URL\u0027s path component in the case of a ServiceWorker fetch", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2845" }, { "category": "external", "summary": "RHBZ#1315362", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1315362" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2845", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2845" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2845", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2845" }, { "category": "external", "summary": "https://codereview.chromium.org/1454003003/", "url": "https://codereview.chromium.org/1454003003/" } ], "release_date": "2015-11-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-03-07T03:22:13+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0359" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Client-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Server-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-0:49.0.2623.75-1.el6.x86_64", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.i686", "6Workstation-Supplementary-6.7.z:chromium-browser-debuginfo-0:49.0.2623.75-1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: CSP implementation in Blink does not ignore a URL\u0027s path component in the case of a ServiceWorker fetch" } ] }
fkie_cve-2016-1634
Vulnerability from fkie_nvd
Published
2016-03-06 02:59
Modified
2024-11-21 02:46
Severity ?
Summary
Use-after-free vulnerability in the StyleResolver::appendCSSStyleSheet function in WebKit/Source/core/css/resolver/StyleResolver.cpp in Blink, as used in Google Chrome before 49.0.2623.75, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted web site that triggers Cascading Style Sheets (CSS) style invalidation during a certain subtree-removal action.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "99CABF0F-D201-46AE-83DC-09257264BF7D", "versionEndIncluding": "48.0.2564.116", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use-after-free vulnerability in the StyleResolver::appendCSSStyleSheet function in WebKit/Source/core/css/resolver/StyleResolver.cpp in Blink, as used in Google Chrome before 49.0.2623.75, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted web site that triggers Cascading Style Sheets (CSS) style invalidation during a certain subtree-removal action." }, { "lang": "es", "value": "Vulnerabilidad de uso despu\u00e9s de liberaci\u00f3n de memoria en la funci\u00f3n StyleResolver::appendCSSStyleSheet en WebKit/Source/core/css/resolver/StyleResolver.cpp en Blink, tal como se utiliza en Google Chrome en versiones anteriores a 49.0.2623.75, permite a atacantes remotos provocar una denegaci\u00f3n de servicio o posiblemente tener otro impacto no especificado a trav\u00e9s de un sitio web manipulado que desencadena la invalidaci\u00f3n del estilo Cascading Style Sheets (CSS) durante cierta acci\u00f3n de eliminaci\u00f3n de sub\u00e1rbol." } ], "evaluatorComment": "\u003ca href=\"http://cwe.mitre.org/data/definitions/416.html\"\u003eCWE-416: Use After Free\u003c/a\u003e", "id": "CVE-2016-1634", "lastModified": "2024-11-21T02:46:46.783", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-03-06T02:59:05.463", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00014.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00015.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00018.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00028.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://www.debian.org/security/2016/dsa-3507" }, { "source": "chrome-cve-admin@google.com", "url": "http://www.securityfocus.com/bid/84008" }, { "source": "chrome-cve-admin@google.com", "url": "http://www.securitytracker.com/id/1035185" }, { "source": "chrome-cve-admin@google.com", "url": "http://www.ubuntu.com/usn/USN-2920-1" }, { "source": "chrome-cve-admin@google.com", "url": "https://code.google.com/p/chromium/issues/detail?id=559292" }, { "source": "chrome-cve-admin@google.com", "url": "https://codereview.chromium.org/1556963002" }, { "source": "chrome-cve-admin@google.com", "url": "https://security.gentoo.org/glsa/201603-09" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00014.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00015.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00018.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00028.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2016/dsa-3507" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/84008" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1035185" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2920-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://code.google.com/p/chromium/issues/detail?id=559292" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://codereview.chromium.org/1556963002" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201603-09" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
ghsa-x5vg-vf43-2r4m
Vulnerability from github
Published
2022-05-17 03:31
Modified
2022-05-17 03:31
Severity ?
Details
Use-after-free vulnerability in the StyleResolver::appendCSSStyleSheet function in WebKit/Source/core/css/resolver/StyleResolver.cpp in Blink, as used in Google Chrome before 49.0.2623.75, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted web site that triggers Cascading Style Sheets (CSS) style invalidation during a certain subtree-removal action.
{ "affected": [], "aliases": [ "CVE-2016-1634" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2016-03-06T02:59:00Z", "severity": "HIGH" }, "details": "Use-after-free vulnerability in the StyleResolver::appendCSSStyleSheet function in WebKit/Source/core/css/resolver/StyleResolver.cpp in Blink, as used in Google Chrome before 49.0.2623.75, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted web site that triggers Cascading Style Sheets (CSS) style invalidation during a certain subtree-removal action.", "id": "GHSA-x5vg-vf43-2r4m", "modified": "2022-05-17T03:31:47Z", "published": "2022-05-17T03:31:47Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1634" }, { "type": "WEB", "url": "https://code.google.com/p/chromium/issues/detail?id=559292" }, { "type": "WEB", "url": "https://codereview.chromium.org/1556963002" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/201603-09" }, { "type": "WEB", "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00014.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00015.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00018.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00028.html" }, { "type": "WEB", "url": "http://www.debian.org/security/2016/dsa-3507" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/84008" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1035185" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2920-1" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.