Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-13702
Vulnerability from cvelistv5
Published
2019-11-25 14:22
Modified
2024-08-05 00:05
Severity ?
EPSS score ?
Summary
Inappropriate implementation in installer in Google Chrome on Windows prior to 78.0.3904.70 allowed a local attacker to perform privilege escalation via a crafted executable.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:05:43.661Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://crbug.com/991125" }, { "name": "openSUSE-SU-2020:0010", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Chrome", "vendor": "Google", "versions": [ { "lessThan": "78.0.3904.70", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Inappropriate implementation in installer in Google Chrome on Windows prior to 78.0.3904.70 allowed a local attacker to perform privilege escalation via a crafted executable." } ], "problemTypes": [ { "descriptions": [ { "description": "Inappropriate implementation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-01-13T12:06:15", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://crbug.com/991125" }, { "name": "openSUSE-SU-2020:0010", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2019-13702", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Chrome", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "78.0.3904.70" } ] } } ] }, "vendor_name": "Google" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Inappropriate implementation in installer in Google Chrome on Windows prior to 78.0.3904.70 allowed a local attacker to perform privilege escalation via a crafted executable." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Inappropriate implementation" } ] } ] }, "references": { "reference_data": [ { "name": "https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html", "refsource": "MISC", "url": "https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html" }, { "name": "https://crbug.com/991125", "refsource": "MISC", "url": "https://crbug.com/991125" }, { "name": "openSUSE-SU-2020:0010", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2019-13702", "datePublished": "2019-11-25T14:22:54", "dateReserved": "2019-07-18T00:00:00", "dateUpdated": "2024-08-05T00:05:43.661Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2019-13702\",\"sourceIdentifier\":\"chrome-cve-admin@google.com\",\"published\":\"2019-11-25T15:15:32.747\",\"lastModified\":\"2024-11-21T04:25:32.373\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Inappropriate implementation in installer in Google Chrome on Windows prior to 78.0.3904.70 allowed a local attacker to perform privilege escalation via a crafted executable.\"},{\"lang\":\"es\",\"value\":\"Una implementaci\u00f3n inapropiada en installer en Google Chrome en Windows versiones anteriores a 78.0.3904.70, permiti\u00f3 a un atacante local realizar una escalada de privilegios por medio de un ejecutable dise\u00f1ado.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-269\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"78.0.3904.70\",\"matchCriteriaId\":\"672BBC37-A438-4A13-B476-F26333E822AE\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"40513095-7E6E-46B3-B604-C926F1BA3568\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"https://crbug.com/991125\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://crbug.com/991125\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
ghsa-456j-pp8g-p3qx
Vulnerability from github
Published
2022-05-24 17:01
Modified
2022-10-14 19:00
Severity ?
Details
Inappropriate implementation in installer in Google Chrome on Windows prior to 78.0.3904.70 allowed a local attacker to perform privilege escalation via a crafted executable.
{ "affected": [], "aliases": [ "CVE-2019-13702" ], "database_specific": { "cwe_ids": [ "CWE-269" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2019-11-25T15:15:00Z", "severity": "MODERATE" }, "details": "Inappropriate implementation in installer in Google Chrome on Windows prior to 78.0.3904.70 allowed a local attacker to perform privilege escalation via a crafted executable.", "id": "GHSA-456j-pp8g-p3qx", "modified": "2022-10-14T19:00:37Z", "published": "2022-05-24T17:01:56Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-13702" }, { "type": "WEB", "url": "https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html" }, { "type": "WEB", "url": "https://crbug.com/991125" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
rhsa-2019_3759
Vulnerability from csaf_redhat
Published
2019-11-06 16:43
Modified
2024-11-15 04:12
Summary
Red Hat Security Advisory: chromium-browser security update
Notes
Topic
An update for chromium-browser is now available for Red Hat Enterprise Linux 6 Supplementary.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Chromium is an open-source web browser, powered by WebKit (Blink).
This update upgrades Chromium to version 78.0.3904.70.
Security Fix(es):
* chromium-browser: Use-after-free in media (CVE-2019-13699)
* chromium-browser: Buffer overrun in Blink (CVE-2019-13700)
* chromium-browser: URL spoof in navigation (CVE-2019-13701)
* chromium-browser: Privilege elevation in Installer (CVE-2019-13702)
* chromium-browser: URL bar spoofing (CVE-2019-13703)
* chromium-browser: CSP bypass (CVE-2019-13704)
* chromium-browser: Extension permission bypass (CVE-2019-13705)
* chromium-browser: Out-of-bounds read in PDFium (CVE-2019-13706)
* chromium-browser: File storage disclosure (CVE-2019-13707)
* chromium-browser: HTTP authentication spoof (CVE-2019-13708)
* chromium-browser: File download protection bypass (CVE-2019-13709)
* chromium-browser: File download protection bypass (CVE-2019-13710)
* chromium-browser: Cross-context information leak (CVE-2019-13711)
* chromium-browser: Cross-origin data leak (CVE-2019-13713)
* chromium-browser: CSS injection (CVE-2019-13714)
* chromium-browser: Address bar spoofing (CVE-2019-13715)
* chromium-browser: Service worker state error (CVE-2019-13716)
* chromium-browser: Notification obscured (CVE-2019-13717)
* chromium-browser: IDN spoof (CVE-2019-13718)
* chromium-browser: Notification obscured (CVE-2019-13719)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for chromium-browser is now available for Red Hat Enterprise Linux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Chromium is an open-source web browser, powered by WebKit (Blink).\n\nThis update upgrades Chromium to version 78.0.3904.70.\n\nSecurity Fix(es):\n\n* chromium-browser: Use-after-free in media (CVE-2019-13699)\n\n* chromium-browser: Buffer overrun in Blink (CVE-2019-13700)\n\n* chromium-browser: URL spoof in navigation (CVE-2019-13701)\n\n* chromium-browser: Privilege elevation in Installer (CVE-2019-13702)\n\n* chromium-browser: URL bar spoofing (CVE-2019-13703)\n\n* chromium-browser: CSP bypass (CVE-2019-13704)\n\n* chromium-browser: Extension permission bypass (CVE-2019-13705)\n\n* chromium-browser: Out-of-bounds read in PDFium (CVE-2019-13706)\n\n* chromium-browser: File storage disclosure (CVE-2019-13707)\n\n* chromium-browser: HTTP authentication spoof (CVE-2019-13708)\n\n* chromium-browser: File download protection bypass (CVE-2019-13709)\n\n* chromium-browser: File download protection bypass (CVE-2019-13710)\n\n* chromium-browser: Cross-context information leak (CVE-2019-13711)\n\n* chromium-browser: Cross-origin data leak (CVE-2019-13713)\n\n* chromium-browser: CSS injection (CVE-2019-13714)\n\n* chromium-browser: Address bar spoofing (CVE-2019-13715)\n\n* chromium-browser: Service worker state error (CVE-2019-13716)\n\n* chromium-browser: Notification obscured (CVE-2019-13717)\n\n* chromium-browser: IDN spoof (CVE-2019-13718)\n\n* chromium-browser: Notification obscured (CVE-2019-13719)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:3759", "url": "https://access.redhat.com/errata/RHSA-2019:3759" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1764756", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764756" }, { "category": "external", "summary": "1764757", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764757" }, { "category": "external", "summary": "1764758", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764758" }, { "category": "external", "summary": "1764759", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764759" }, { "category": "external", "summary": "1764760", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764760" }, { "category": "external", "summary": "1764761", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764761" }, { "category": "external", "summary": "1764762", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764762" }, { "category": "external", "summary": "1764763", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764763" }, { "category": "external", "summary": "1764764", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764764" }, { "category": "external", "summary": "1764765", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764765" }, { "category": "external", "summary": "1764766", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764766" }, { "category": "external", "summary": "1764767", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764767" }, { "category": "external", "summary": "1764768", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764768" }, { "category": "external", "summary": "1764769", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764769" }, { "category": "external", "summary": "1764770", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764770" }, { "category": "external", "summary": "1764771", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764771" }, { "category": "external", "summary": "1764772", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764772" }, { "category": "external", "summary": "1764773", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764773" }, { "category": "external", "summary": "1764774", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764774" }, { "category": "external", "summary": "1764775", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764775" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3759.json" } ], "title": "Red Hat Security Advisory: chromium-browser security update", "tracking": { "current_release_date": "2024-11-15T04:12:05+00:00", "generator": { "date": "2024-11-15T04:12:05+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2019:3759", "initial_release_date": "2019-11-06T16:43:06+00:00", "revision_history": [ { "date": "2019-11-06T16:43:06+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-11-06T16:43:06+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T04:12:05+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "chromium-browser-0:78.0.3904.70-1.el6_10.i686", "product": { "name": "chromium-browser-0:78.0.3904.70-1.el6_10.i686", "product_id": "chromium-browser-0:78.0.3904.70-1.el6_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/chromium-browser@78.0.3904.70-1.el6_10?arch=i686" } } }, { "category": "product_version", "name": "chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "product": { "name": "chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "product_id": "chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/chromium-browser-debuginfo@78.0.3904.70-1.el6_10?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "product": { "name": "chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "product_id": "chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/chromium-browser@78.0.3904.70-1.el6_10?arch=x86_64" } } }, { "category": "product_version", "name": "chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "product": { "name": "chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "product_id": "chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/chromium-browser-debuginfo@78.0.3904.70-1.el6_10?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:78.0.3904.70-1.el6_10.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686" }, "product_reference": "chromium-browser-0:78.0.3904.70-1.el6_10.i686", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:78.0.3904.70-1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64" }, "product_reference": "chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686" }, "product_reference": "chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" }, "product_reference": "chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:78.0.3904.70-1.el6_10.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686" }, "product_reference": "chromium-browser-0:78.0.3904.70-1.el6_10.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:78.0.3904.70-1.el6_10.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64" }, "product_reference": "chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686" }, "product_reference": "chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" }, "product_reference": "chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:78.0.3904.70-1.el6_10.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686" }, "product_reference": "chromium-browser-0:78.0.3904.70-1.el6_10.i686", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:78.0.3904.70-1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64" }, "product_reference": "chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686" }, "product_reference": "chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" }, "product_reference": "chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:78.0.3904.70-1.el6_10.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686" }, "product_reference": "chromium-browser-0:78.0.3904.70-1.el6_10.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:78.0.3904.70-1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64" }, "product_reference": "chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686" }, "product_reference": "chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" }, "product_reference": "chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-13699", "discovery_date": "2019-10-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1764756" } ], "notes": [ { "category": "description", "text": "Use after free in media in Google Chrome prior to 78.0.3904.70 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Use-after-free in media", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-13699" }, { "category": "external", "summary": "RHBZ#1764756", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764756" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-13699", "url": "https://www.cve.org/CVERecord?id=CVE-2019-13699" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-13699", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-13699" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html", "url": "https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html" } ], "release_date": "2019-10-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-06T16:43:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3759" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: Use-after-free in media" }, { "cve": "CVE-2019-13700", "discovery_date": "2019-10-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1764757" } ], "notes": [ { "category": "description", "text": "Out of bounds memory access in the gamepad API in Google Chrome prior to 78.0.3904.70 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Buffer overrun in Blink", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-13700" }, { "category": "external", "summary": "RHBZ#1764757", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764757" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-13700", "url": "https://www.cve.org/CVERecord?id=CVE-2019-13700" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-13700", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-13700" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html", "url": "https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html" } ], "release_date": "2019-10-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-06T16:43:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3759" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: Buffer overrun in Blink" }, { "cve": "CVE-2019-13701", "discovery_date": "2019-10-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1764758" } ], "notes": [ { "category": "description", "text": "Incorrect implementation in navigation in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: URL spoof in navigation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-13701" }, { "category": "external", "summary": "RHBZ#1764758", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764758" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-13701", "url": "https://www.cve.org/CVERecord?id=CVE-2019-13701" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-13701", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-13701" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html", "url": "https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html" } ], "release_date": "2019-10-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-06T16:43:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3759" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: URL spoof in navigation" }, { "cve": "CVE-2019-13702", "discovery_date": "2019-10-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1764759" } ], "notes": [ { "category": "description", "text": "Inappropriate implementation in installer in Google Chrome on Windows prior to 78.0.3904.70 allowed a local attacker to perform privilege escalation via a crafted executable.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Privilege elevation in Installer", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-13702" }, { "category": "external", "summary": "RHBZ#1764759", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764759" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-13702", "url": "https://www.cve.org/CVERecord?id=CVE-2019-13702" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-13702", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-13702" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html", "url": "https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html" } ], "release_date": "2019-10-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-06T16:43:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3759" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: Privilege elevation in Installer" }, { "cve": "CVE-2019-13703", "discovery_date": "2019-10-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1764760" } ], "notes": [ { "category": "description", "text": "Insufficient policy enforcement in the Omnibox in Google Chrome on Android prior to 78.0.3904.70 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: URL bar spoofing", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-13703" }, { "category": "external", "summary": "RHBZ#1764760", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764760" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-13703", "url": "https://www.cve.org/CVERecord?id=CVE-2019-13703" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-13703", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-13703" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html", "url": "https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html" } ], "release_date": "2019-10-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-06T16:43:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3759" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: URL bar spoofing" }, { "cve": "CVE-2019-13704", "discovery_date": "2019-10-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1764761" } ], "notes": [ { "category": "description", "text": "Insufficient policy enforcement in navigation in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to bypass content security policy via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: CSP bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-13704" }, { "category": "external", "summary": "RHBZ#1764761", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764761" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-13704", "url": "https://www.cve.org/CVERecord?id=CVE-2019-13704" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-13704", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-13704" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html", "url": "https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html" } ], "release_date": "2019-10-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-06T16:43:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3759" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: CSP bypass" }, { "cve": "CVE-2019-13705", "discovery_date": "2019-10-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1764762" } ], "notes": [ { "category": "description", "text": "Insufficient policy enforcement in extensions in Google Chrome prior to 78.0.3904.70 allowed an attacker who convinced a user to install a malicious extension to leak cross-origin data via a crafted Chrome Extension.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Extension permission bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-13705" }, { "category": "external", "summary": "RHBZ#1764762", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764762" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-13705", "url": "https://www.cve.org/CVERecord?id=CVE-2019-13705" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-13705", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-13705" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html", "url": "https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html" } ], "release_date": "2019-10-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-06T16:43:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3759" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: Extension permission bypass" }, { "cve": "CVE-2019-13706", "discovery_date": "2019-10-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1764763" } ], "notes": [ { "category": "description", "text": "Out of bounds memory access in PDFium in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Out-of-bounds read in PDFium", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-13706" }, { "category": "external", "summary": "RHBZ#1764763", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764763" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-13706", "url": "https://www.cve.org/CVERecord?id=CVE-2019-13706" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-13706", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-13706" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html", "url": "https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html" } ], "release_date": "2019-10-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-06T16:43:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3759" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: Out-of-bounds read in PDFium" }, { "cve": "CVE-2019-13707", "discovery_date": "2019-10-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1764764" } ], "notes": [ { "category": "description", "text": "Insufficient validation of untrusted input in intents in Google Chrome on Android prior to 78.0.3904.70 allowed a local attacker to leak files via a crafted application.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: File storage disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-13707" }, { "category": "external", "summary": "RHBZ#1764764", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764764" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-13707", "url": "https://www.cve.org/CVERecord?id=CVE-2019-13707" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-13707", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-13707" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html", "url": "https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html" } ], "release_date": "2019-10-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-06T16:43:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3759" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: File storage disclosure" }, { "cve": "CVE-2019-13708", "discovery_date": "2019-10-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1764765" } ], "notes": [ { "category": "description", "text": "Inappropriate implementation in navigation in Google Chrome on iOS prior to 78.0.3904.70 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: HTTP authentication spoof", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-13708" }, { "category": "external", "summary": "RHBZ#1764765", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764765" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-13708", "url": "https://www.cve.org/CVERecord?id=CVE-2019-13708" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-13708", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-13708" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html", "url": "https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html" } ], "release_date": "2019-10-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-06T16:43:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3759" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: HTTP authentication spoof" }, { "cve": "CVE-2019-13709", "discovery_date": "2019-10-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1764766" } ], "notes": [ { "category": "description", "text": "Insufficient policy enforcement in downloads in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to bypass download restrictions via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: File download protection bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-13709" }, { "category": "external", "summary": "RHBZ#1764766", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764766" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-13709", "url": "https://www.cve.org/CVERecord?id=CVE-2019-13709" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-13709", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-13709" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html", "url": "https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html" } ], "release_date": "2019-10-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-06T16:43:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3759" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: File download protection bypass" }, { "cve": "CVE-2019-13710", "discovery_date": "2019-10-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1764767" } ], "notes": [ { "category": "description", "text": "Insufficient validation of untrusted input in downloads in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to bypass download restrictions via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: File download protection bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-13710" }, { "category": "external", "summary": "RHBZ#1764767", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764767" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-13710", "url": "https://www.cve.org/CVERecord?id=CVE-2019-13710" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-13710", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-13710" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html", "url": "https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html" } ], "release_date": "2019-10-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-06T16:43:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3759" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: File download protection bypass" }, { "cve": "CVE-2019-13711", "discovery_date": "2019-10-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1764768" } ], "notes": [ { "category": "description", "text": "Insufficient policy enforcement in JavaScript in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to leak cross-origin data via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Cross-context information leak", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-13711" }, { "category": "external", "summary": "RHBZ#1764768", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764768" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-13711", "url": "https://www.cve.org/CVERecord?id=CVE-2019-13711" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-13711", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-13711" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html", "url": "https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html" } ], "release_date": "2019-10-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-06T16:43:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3759" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: Cross-context information leak" }, { "cve": "CVE-2019-13713", "discovery_date": "2019-10-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1764769" } ], "notes": [ { "category": "description", "text": "Insufficient policy enforcement in JavaScript in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to leak cross-origin data via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Cross-origin data leak", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-13713" }, { "category": "external", "summary": "RHBZ#1764769", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764769" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-13713", "url": "https://www.cve.org/CVERecord?id=CVE-2019-13713" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-13713", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-13713" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html", "url": "https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html" } ], "release_date": "2019-10-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-06T16:43:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3759" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: Cross-origin data leak" }, { "cve": "CVE-2019-13714", "discovery_date": "2019-10-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1764770" } ], "notes": [ { "category": "description", "text": "Insufficient validation of untrusted input in Color Enhancer extension in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to inject CSS into an HTML page via a crafted URL.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: CSS injection", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-13714" }, { "category": "external", "summary": "RHBZ#1764770", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764770" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-13714", "url": "https://www.cve.org/CVERecord?id=CVE-2019-13714" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-13714", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-13714" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html", "url": "https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html" } ], "release_date": "2019-10-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-06T16:43:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3759" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "chromium-browser: CSS injection" }, { "cve": "CVE-2019-13715", "discovery_date": "2019-10-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1764771" } ], "notes": [ { "category": "description", "text": "Insufficient validation of untrusted input in Omnibox in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Address bar spoofing", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-13715" }, { "category": "external", "summary": "RHBZ#1764771", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764771" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-13715", "url": "https://www.cve.org/CVERecord?id=CVE-2019-13715" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-13715", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-13715" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html", "url": "https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html" } ], "release_date": "2019-10-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-06T16:43:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3759" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "chromium-browser: Address bar spoofing" }, { "cve": "CVE-2019-13716", "discovery_date": "2019-10-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1764772" } ], "notes": [ { "category": "description", "text": "Insufficient policy enforcement in service workers in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Service worker state error", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-13716" }, { "category": "external", "summary": "RHBZ#1764772", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764772" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-13716", "url": "https://www.cve.org/CVERecord?id=CVE-2019-13716" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-13716", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-13716" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html", "url": "https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html" } ], "release_date": "2019-10-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-06T16:43:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3759" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "chromium-browser: Service worker state error" }, { "cve": "CVE-2019-13717", "discovery_date": "2019-10-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1764773" } ], "notes": [ { "category": "description", "text": "Incorrect security UI in full screen mode in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to hide security UI via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Notification obscured", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-13717" }, { "category": "external", "summary": "RHBZ#1764773", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764773" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-13717", "url": "https://www.cve.org/CVERecord?id=CVE-2019-13717" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-13717", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-13717" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html", "url": "https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html" } ], "release_date": "2019-10-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-06T16:43:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3759" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "chromium-browser: Notification obscured" }, { "cve": "CVE-2019-13718", "discovery_date": "2019-10-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1764774" } ], "notes": [ { "category": "description", "text": "Insufficient data validation in Omnibox in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: IDN spoof", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-13718" }, { "category": "external", "summary": "RHBZ#1764774", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764774" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-13718", "url": "https://www.cve.org/CVERecord?id=CVE-2019-13718" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-13718", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-13718" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html", "url": "https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html" } ], "release_date": "2019-10-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-06T16:43:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3759" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "chromium-browser: IDN spoof" }, { "cve": "CVE-2019-13719", "discovery_date": "2019-10-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1764775" } ], "notes": [ { "category": "description", "text": "Incorrect security UI in full screen mode in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to hide security UI via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Notification obscured", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-13719" }, { "category": "external", "summary": "RHBZ#1764775", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764775" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-13719", "url": "https://www.cve.org/CVERecord?id=CVE-2019-13719" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-13719", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-13719" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html", "url": "https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html" } ], "release_date": "2019-10-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-06T16:43:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3759" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:78.0.3904.70-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:78.0.3904.70-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "chromium-browser: Notification obscured" } ] }
gsd-2019-13702
Vulnerability from gsd
Modified
2023-12-13 01:23
Details
Inappropriate implementation in installer in Google Chrome on Windows prior to 78.0.3904.70 allowed a local attacker to perform privilege escalation via a crafted executable.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2019-13702", "description": "Inappropriate implementation in installer in Google Chrome on Windows prior to 78.0.3904.70 allowed a local attacker to perform privilege escalation via a crafted executable.", "id": "GSD-2019-13702", "references": [ "https://www.suse.com/security/cve/CVE-2019-13702.html", "https://www.debian.org/security/2019/dsa-4562", "https://access.redhat.com/errata/RHSA-2019:3759", "https://advisories.mageia.org/CVE-2019-13702.html", "https://security.archlinux.org/CVE-2019-13702" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2019-13702" ], "details": "Inappropriate implementation in installer in Google Chrome on Windows prior to 78.0.3904.70 allowed a local attacker to perform privilege escalation via a crafted executable.", "id": "GSD-2019-13702", "modified": "2023-12-13T01:23:41.710751Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2019-13702", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Chrome", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "78.0.3904.70" } ] } } ] }, "vendor_name": "Google" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Inappropriate implementation in installer in Google Chrome on Windows prior to 78.0.3904.70 allowed a local attacker to perform privilege escalation via a crafted executable." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Inappropriate implementation" } ] } ] }, "references": { "reference_data": [ { "name": "https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html", "refsource": "MISC", "url": "https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html" }, { "name": "https://crbug.com/991125", "refsource": "MISC", "url": "https://crbug.com/991125" }, { "name": "openSUSE-SU-2020:0010", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "78.0.3904.70", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2019-13702" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Inappropriate implementation in installer in Google Chrome on Windows prior to 78.0.3904.70 allowed a local attacker to perform privilege escalation via a crafted executable." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-269" } ] } ] }, "references": { "reference_data": [ { "name": "https://crbug.com/991125", "refsource": "MISC", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://crbug.com/991125" }, { "name": "https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html", "refsource": "MISC", "tags": [ "Vendor Advisory" ], "url": "https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html" }, { "name": "openSUSE-SU-2020:0010", "refsource": "SUSE", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": true }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9 } }, "lastModifiedDate": "2022-10-14T16:50Z", "publishedDate": "2019-11-25T15:15Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.