Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-5825 (GCVE-0-2019-5825)
Vulnerability from cvelistv5
- Out of bounds write
▼ | URL | Tags | |
---|---|---|---|
chrome-cve-admin@google.com | http://packetstormsecurity.com/files/156641/Google-Chrome-72-73-Array.map-Corruption.html | Exploit, Third Party Advisory, VDB Entry | |
chrome-cve-admin@google.com | https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_30.html | Release Notes, Vendor Advisory | |
chrome-cve-admin@google.com | https://crbug.com/941743 | Exploit, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/156641/Google-Chrome-72-73-Array.map-Corruption.html | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_30.html | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://crbug.com/941743 | Exploit, Patch, Third Party Advisory |
CISA Known exploited vulnerability
Data from the Known Exploited Vulnerabilities Catalog
Date added: 2022-06-08
Due date: 2022-06-22
Required action: Apply updates per vendor instructions.
Used in ransomware: Unknown
Notes: https://nvd.nist.gov/vuln/detail/CVE-2019-5825
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:09:23.413Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_30.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://crbug.com/941743" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/156641/Google-Chrome-72-73-Array.map-Corruption.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2019-5825", "options": [ { "Exploitation": "active" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-04T15:31:51.833533Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2022-06-08", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-5825" }, "type": "kev" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-30T01:45:54.034Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "timeline": [ { "lang": "en", "time": "2022-06-08T00:00:00+00:00", "value": "CVE-2019-5825 added to CISA KEV" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Chrome", "vendor": "Google", "versions": [ { "lessThan": "73.0.3683.86", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Out of bounds write in JavaScript in Google Chrome prior to 73.0.3683.86 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page." } ], "problemTypes": [ { "descriptions": [ { "description": "Out of bounds write", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-05T22:06:05.000Z", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_30.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://crbug.com/941743" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/156641/Google-Chrome-72-73-Array.map-Corruption.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "chrome-cve-admin@google.com", "ID": "CVE-2019-5825", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Chrome", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "73.0.3683.86" } ] } } ] }, "vendor_name": "Google" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Out of bounds write in JavaScript in Google Chrome prior to 73.0.3683.86 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out of bounds write" } ] } ] }, "references": { "reference_data": [ { "name": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_30.html", "refsource": "MISC", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_30.html" }, { "name": "https://crbug.com/941743", "refsource": "MISC", "url": "https://crbug.com/941743" }, { "name": "http://packetstormsecurity.com/files/156641/Google-Chrome-72-73-Array.map-Corruption.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/156641/Google-Chrome-72-73-Array.map-Corruption.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2019-5825", "datePublished": "2019-11-25T19:41:18.000Z", "dateReserved": "2019-01-09T00:00:00.000Z", "dateUpdated": "2025-07-30T01:45:54.034Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "cisa_known_exploited": { "cveID": "CVE-2019-5825", "cwes": "[\"CWE-787\"]", "dateAdded": "2022-06-08", "dueDate": "2022-06-22", "knownRansomwareCampaignUse": "Unknown", "notes": "https://nvd.nist.gov/vuln/detail/CVE-2019-5825", "product": "Chromium V8", "requiredAction": "Apply updates per vendor instructions.", "shortDescription": "Google Chromium V8 Engine contains an out-of-bounds write vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.", "vendorProject": "Google", "vulnerabilityName": "Google Chromium V8 Out-of-Bounds Write Vulnerability" }, "nvd": "{\"cve\":{\"id\":\"CVE-2019-5825\",\"sourceIdentifier\":\"chrome-cve-admin@google.com\",\"published\":\"2019-11-25T20:15:11.483\",\"lastModified\":\"2025-02-04T18:24:48.320\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Out of bounds write in JavaScript in Google Chrome prior to 73.0.3683.86 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\"},{\"lang\":\"es\",\"value\":\"Una escritura fuera de l\u00edmites en JavaScript en Google Chrome versiones anteriores a 73.0.3683.86, permiti\u00f3 a un atacante remoto, explotar potencialmente una corrupci\u00f3n de la pila por medio de una p\u00e1gina HTML dise\u00f1ada.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:N/A:P\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"cisaExploitAdd\":\"2022-06-08\",\"cisaActionDue\":\"2022-06-22\",\"cisaRequiredAction\":\"Apply updates per vendor instructions.\",\"cisaVulnerabilityName\":\"Google Chromium V8 Out-of-Bounds Write Vulnerability\",\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"73.0.3683.86\",\"matchCriteriaId\":\"062592A4-5D86-4AF9-A0AD-3267C81147F9\"}]}]}],\"references\":[{\"url\":\"http://packetstormsecurity.com/files/156641/Google-Chrome-72-73-Array.map-Corruption.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_30.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://crbug.com/941743\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Exploit\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/156641/Google-Chrome-72-73-Array.map-Corruption.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_30.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://crbug.com/941743\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\",\"Third Party Advisory\"]}]}}", "vulnrichment": { "containers": "{\"cna\": {\"affected\": [{\"product\": \"Chrome\", \"vendor\": \"Google\", \"versions\": [{\"lessThan\": \"73.0.3683.86\", \"status\": \"affected\", \"version\": \"unspecified\", \"versionType\": \"custom\"}]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Out of bounds write in JavaScript in Google Chrome prior to 73.0.3683.86 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\"}], \"problemTypes\": [{\"descriptions\": [{\"description\": \"Out of bounds write\", \"lang\": \"en\", \"type\": \"text\"}]}], \"providerMetadata\": {\"dateUpdated\": \"2020-03-05T22:06:05.000Z\", \"orgId\": \"ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28\", \"shortName\": \"Chrome\"}, \"references\": [{\"tags\": [\"x_refsource_MISC\"], \"url\": \"https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_30.html\"}, {\"tags\": [\"x_refsource_MISC\"], \"url\": \"https://crbug.com/941743\"}, {\"tags\": [\"x_refsource_MISC\"], \"url\": \"http://packetstormsecurity.com/files/156641/Google-Chrome-72-73-Array.map-Corruption.html\"}], \"x_legacyV4Record\": {\"CVE_data_meta\": {\"ASSIGNER\": \"chrome-cve-admin@google.com\", \"ID\": \"CVE-2019-5825\", \"STATE\": \"PUBLIC\"}, \"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"product_name\": \"Chrome\", \"version\": {\"version_data\": [{\"version_affected\": \"\u003c\", \"version_value\": \"73.0.3683.86\"}]}}]}, \"vendor_name\": \"Google\"}]}}, \"data_format\": \"MITRE\", \"data_type\": \"CVE\", \"data_version\": \"4.0\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"Out of bounds write in JavaScript in Google Chrome prior to 73.0.3683.86 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"Out of bounds write\"}]}]}, \"references\": {\"reference_data\": [{\"name\": \"https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_30.html\", \"refsource\": \"MISC\", \"url\": \"https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_30.html\"}, {\"name\": \"https://crbug.com/941743\", \"refsource\": \"MISC\", \"url\": \"https://crbug.com/941743\"}, {\"name\": \"http://packetstormsecurity.com/files/156641/Google-Chrome-72-73-Array.map-Corruption.html\", \"refsource\": \"MISC\", \"url\": \"http://packetstormsecurity.com/files/156641/Google-Chrome-72-73-Array.map-Corruption.html\"}]}}}, \"adp\": [{\"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-04T20:09:23.413Z\"}, \"title\": \"CVE Program Container\", \"references\": [{\"tags\": [\"x_refsource_MISC\", \"x_transferred\"], \"url\": \"https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_30.html\"}, {\"tags\": [\"x_refsource_MISC\", \"x_transferred\"], \"url\": \"https://crbug.com/941743\"}, {\"tags\": [\"x_refsource_MISC\", \"x_transferred\"], \"url\": \"http://packetstormsecurity.com/files/156641/Google-Chrome-72-73-Array.map-Corruption.html\"}]}, {\"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 6.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2019-5825\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"active\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-02-04T15:31:51.833533Z\"}}}, {\"other\": {\"type\": \"kev\", \"content\": {\"dateAdded\": \"2022-06-08\", \"reference\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-5825\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-787\", \"description\": \"CWE-787 Out-of-bounds Write\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-01-29T17:15:25.250Z\"}, \"timeline\": [{\"time\": \"2022-06-08T00:00:00+00:00\", \"lang\": \"en\", \"value\": \"CVE-2019-5825 added to CISA KEV\"}], \"title\": \"CISA ADP Vulnrichment\"}]}", "cveMetadata": "{\"assignerOrgId\": \"ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28\", \"assignerShortName\": \"Chrome\", \"cveId\": \"CVE-2019-5825\", \"datePublished\": \"2019-11-25T19:41:18.000Z\", \"dateReserved\": \"2019-01-09T00:00:00.000Z\", \"dateUpdated\": \"2025-07-30T01:45:54.034Z\", \"state\": \"PUBLISHED\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
RHSA-2019:1021
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for chromium-browser is now available for Red Hat Enterprise Linux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Chromium is an open-source web browser, powered by WebKit (Blink).\n\nThis update upgrades Chromium to version 74.0.3729.108.\n\nSecurity Fix(es):\n\n* chromium-browser: Use after free in PDFium (CVE-2019-5805)\n\n* chromium-browser: Integer overflow in Angle (CVE-2019-5806)\n\n* chromium-browser: Memory corruption in V8 (CVE-2019-5807)\n\n* chromium-browser: Use after free in Blink (CVE-2019-5808)\n\n* chromium-browser: Use after free in Blink (CVE-2019-5809)\n\n* chromium-browser: User information disclosure in Autofill (CVE-2019-5810)\n\n* chromium-browser: CORS bypass in Blink (CVE-2019-5811)\n\n* chromium-browser: Out of bounds read in V8 (CVE-2019-5813)\n\n* chromium-browser: CORS bypass in Blink (CVE-2019-5814)\n\n* chromium-browser: Heap buffer overflow in Blink (CVE-2019-5815)\n\n* chromium-browser: Uninitialized value in media reader (CVE-2019-5818)\n\n* chromium-browser: Incorrect escaping in developer tools (CVE-2019-5819)\n\n* chromium-browser: Integer overflow in PDFium (CVE-2019-5820)\n\n* chromium-browser: Integer overflow in PDFium (CVE-2019-5821)\n\n* chromium-browser: CORS bypass in download manager (CVE-2019-5822)\n\n* chromium-browser: Forced navigation from service worker (CVE-2019-5823)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:1021", "url": "https://access.redhat.com/errata/RHSA-2019:1021" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1702895", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702895" }, { "category": "external", "summary": "1702896", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702896" }, { "category": "external", "summary": "1702897", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702897" }, { "category": "external", "summary": "1702898", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702898" }, { "category": "external", "summary": "1702899", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702899" }, { "category": "external", "summary": "1702900", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702900" }, { "category": "external", "summary": "1702901", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702901" }, { "category": "external", "summary": "1702903", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702903" }, { "category": "external", "summary": "1702904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702904" }, { "category": "external", "summary": "1702905", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702905" }, { "category": "external", "summary": "1702908", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702908" }, { "category": "external", "summary": "1702909", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702909" }, { "category": "external", "summary": "1702910", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702910" }, { "category": "external", "summary": "1702911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702911" }, { "category": "external", "summary": "1702912", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702912" }, { "category": "external", "summary": "1702913", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702913" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1021.json" } ], "title": "Red Hat Security Advisory: chromium-browser security update", "tracking": { "current_release_date": "2025-09-10T14:26:42+00:00", "generator": { "date": "2025-09-10T14:26:42+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2019:1021", "initial_release_date": "2019-05-07T17:06:08+00:00", "revision_history": [ { "date": "2019-05-07T17:06:08+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-05-07T17:06:08+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T14:26:42+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "product": { "name": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "product_id": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/chromium-browser-debuginfo@74.0.3729.108-1.el6_10?arch=x86_64" } } }, { "category": "product_version", "name": "chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "product": { "name": "chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "product_id": "chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/chromium-browser@74.0.3729.108-1.el6_10?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "product": { "name": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "product_id": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/chromium-browser-debuginfo@74.0.3729.108-1.el6_10?arch=i686" } } }, { "category": "product_version", "name": "chromium-browser-0:74.0.3729.108-1.el6_10.i686", "product": { "name": "chromium-browser-0:74.0.3729.108-1.el6_10.i686", "product_id": "chromium-browser-0:74.0.3729.108-1.el6_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/chromium-browser@74.0.3729.108-1.el6_10?arch=i686" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:74.0.3729.108-1.el6_10.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686" }, "product_reference": "chromium-browser-0:74.0.3729.108-1.el6_10.i686", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:74.0.3729.108-1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64" }, "product_reference": "chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686" }, "product_reference": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" }, "product_reference": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:74.0.3729.108-1.el6_10.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686" }, "product_reference": "chromium-browser-0:74.0.3729.108-1.el6_10.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:74.0.3729.108-1.el6_10.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64" }, "product_reference": "chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686" }, "product_reference": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" }, "product_reference": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:74.0.3729.108-1.el6_10.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686" }, "product_reference": "chromium-browser-0:74.0.3729.108-1.el6_10.i686", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:74.0.3729.108-1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64" }, "product_reference": "chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686" }, "product_reference": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" }, "product_reference": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:74.0.3729.108-1.el6_10.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686" }, "product_reference": "chromium-browser-0:74.0.3729.108-1.el6_10.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:74.0.3729.108-1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64" }, "product_reference": "chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686" }, "product_reference": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" }, "product_reference": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-5805", "discovery_date": "2019-04-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1702895" } ], "notes": [ { "category": "description", "text": "Use-after-free in PDFium in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Use after free in PDFium", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5805" }, { "category": "external", "summary": "RHBZ#1702895", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702895" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5805", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5805" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5805", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5805" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html" } ], "release_date": "2019-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T17:06:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: Use after free in PDFium" }, { "cve": "CVE-2019-5806", "discovery_date": "2019-04-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1702896" } ], "notes": [ { "category": "description", "text": "Integer overflow in ANGLE in Google Chrome on Windows prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Integer overflow in Angle", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5806" }, { "category": "external", "summary": "RHBZ#1702896", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702896" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5806", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5806" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5806", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5806" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html" } ], "release_date": "2019-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T17:06:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: Integer overflow in Angle" }, { "cve": "CVE-2019-5807", "discovery_date": "2019-04-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1702897" } ], "notes": [ { "category": "description", "text": "Object lifetime issue in V8 in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Memory corruption in V8", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5807" }, { "category": "external", "summary": "RHBZ#1702897", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702897" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5807", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5807" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5807", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5807" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html" } ], "release_date": "2019-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T17:06:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: Memory corruption in V8" }, { "cve": "CVE-2019-5808", "discovery_date": "2019-04-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1702898" } ], "notes": [ { "category": "description", "text": "Use after free in Blink in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Use after free in Blink", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5808" }, { "category": "external", "summary": "RHBZ#1702898", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702898" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5808", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5808" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5808", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5808" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html" } ], "release_date": "2019-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T17:06:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: Use after free in Blink" }, { "cve": "CVE-2019-5809", "discovery_date": "2019-04-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1702899" } ], "notes": [ { "category": "description", "text": "Use after free in file chooser in Google Chrome prior to 74.0.3729.108 allowed a remote attacker who had compromised the renderer process to perform privilege escalation via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Use after free in Blink", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5809" }, { "category": "external", "summary": "RHBZ#1702899", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702899" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5809", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5809" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5809", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5809" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html" } ], "release_date": "2019-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T17:06:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: Use after free in Blink" }, { "cve": "CVE-2019-5810", "discovery_date": "2019-04-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1702900" } ], "notes": [ { "category": "description", "text": "Information leak in autofill in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: User information disclosure in Autofill", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5810" }, { "category": "external", "summary": "RHBZ#1702900", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702900" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5810", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5810" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5810", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5810" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html" } ], "release_date": "2019-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T17:06:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: User information disclosure in Autofill" }, { "cve": "CVE-2019-5811", "discovery_date": "2019-04-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1702901" } ], "notes": [ { "category": "description", "text": "Incorrect handling of CORS in ServiceWorker in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to bypass same origin policy via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: CORS bypass in Blink", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5811" }, { "category": "external", "summary": "RHBZ#1702901", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702901" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5811", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5811" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5811", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5811" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html" } ], "release_date": "2019-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T17:06:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: CORS bypass in Blink" }, { "cve": "CVE-2019-5813", "discovery_date": "2019-04-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1702903" } ], "notes": [ { "category": "description", "text": "Use after free in V8 in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Out of bounds read in V8", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5813" }, { "category": "external", "summary": "RHBZ#1702903", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702903" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5813", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5813" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5813", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5813" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html" } ], "release_date": "2019-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T17:06:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: Out of bounds read in V8" }, { "cve": "CVE-2019-5814", "discovery_date": "2019-04-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1702904" } ], "notes": [ { "category": "description", "text": "Insufficient policy enforcement in Blink in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to leak cross-origin data via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: CORS bypass in Blink", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5814" }, { "category": "external", "summary": "RHBZ#1702904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702904" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5814", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5814" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5814", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5814" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html" } ], "release_date": "2019-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T17:06:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: CORS bypass in Blink" }, { "cve": "CVE-2019-5815", "discovery_date": "2019-04-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1702905" } ], "notes": [ { "category": "description", "text": "Type confusion in xsltNumberFormatGetMultipleLevel prior to libxslt 1.1.33 could allow attackers to potentially exploit heap corruption via crafted XML data.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Heap buffer overflow in Blink", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5815" }, { "category": "external", "summary": "RHBZ#1702905", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702905" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5815", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5815" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5815", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5815" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html" } ], "release_date": "2019-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T17:06:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: Heap buffer overflow in Blink" }, { "cve": "CVE-2019-5818", "discovery_date": "2019-04-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1702908" } ], "notes": [ { "category": "description", "text": "Uninitialized data in media in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted video file.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Uninitialized value in media reader", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5818" }, { "category": "external", "summary": "RHBZ#1702908", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702908" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5818", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5818" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5818", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5818" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html" } ], "release_date": "2019-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T17:06:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: Uninitialized value in media reader" }, { "cve": "CVE-2019-5819", "discovery_date": "2019-04-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1702909" } ], "notes": [ { "category": "description", "text": "Insufficient data validation in developer tools in Google Chrome on OS X prior to 74.0.3729.108 allowed a local attacker to execute arbitrary code via a crafted string copied to clipboard.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Incorrect escaping in developer tools", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5819" }, { "category": "external", "summary": "RHBZ#1702909", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702909" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5819", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5819" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5819", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5819" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html" } ], "release_date": "2019-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T17:06:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: Incorrect escaping in developer tools" }, { "cve": "CVE-2019-5820", "discovery_date": "2019-04-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1702910" } ], "notes": [ { "category": "description", "text": "Integer overflow in PDFium in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Integer overflow in PDFium", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5820" }, { "category": "external", "summary": "RHBZ#1702910", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702910" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5820", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5820" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5820", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5820" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html" } ], "release_date": "2019-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T17:06:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: Integer overflow in PDFium" }, { "cve": "CVE-2019-5821", "discovery_date": "2019-04-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1702911" } ], "notes": [ { "category": "description", "text": "Integer overflow in PDFium in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Integer overflow in PDFium", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5821" }, { "category": "external", "summary": "RHBZ#1702911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702911" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5821", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5821" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5821", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5821" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html" } ], "release_date": "2019-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T17:06:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: Integer overflow in PDFium" }, { "cve": "CVE-2019-5822", "discovery_date": "2019-04-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1702912" } ], "notes": [ { "category": "description", "text": "Inappropriate implementation in Blink in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to bypass same origin policy via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: CORS bypass in download manager", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5822" }, { "category": "external", "summary": "RHBZ#1702912", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702912" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5822", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5822" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5822", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5822" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html" } ], "release_date": "2019-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T17:06:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "chromium-browser: CORS bypass in download manager" }, { "cve": "CVE-2019-5823", "discovery_date": "2019-04-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1702913" } ], "notes": [ { "category": "description", "text": "Insufficient policy enforcement in service workers in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Forced navigation from service worker", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5823" }, { "category": "external", "summary": "RHBZ#1702913", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702913" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5823", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5823" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5823", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5823" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html" } ], "release_date": "2019-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T17:06:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "chromium-browser: Forced navigation from service worker" }, { "cve": "CVE-2019-5825", "discovery_date": "2019-05-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1707247" } ], "notes": [ { "category": "description", "text": "Out of bounds write in JavaScript in Google Chrome prior to 73.0.3683.86 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Out-of-bounds write in V8", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5825" }, { "category": "external", "summary": "RHBZ#1707247", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1707247" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5825", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5825" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5825", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5825" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_30.html", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_30.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2019-04-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T17:06:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-06-08T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "chromium-browser: Out-of-bounds write in V8" }, { "cve": "CVE-2019-5826", "discovery_date": "2019-05-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1707248" } ], "notes": [ { "category": "description", "text": "Use after free in IndexedDB in Google Chrome prior to 73.0.3683.86 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Use-after-free in IndexedDB", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5826" }, { "category": "external", "summary": "RHBZ#1707248", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1707248" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5826", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5826" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5826", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5826" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_30.html", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_30.html" } ], "release_date": "2019-04-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T17:06:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: Use-after-free in IndexedDB" }, { "cve": "CVE-2020-6503", "cwe": { "id": "CWE-358", "name": "Improperly Implemented Security Check for Standard" }, "discovery_date": "2020-06-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1844476" } ], "notes": [ { "category": "description", "text": "Inappropriate implementation in accessibility in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Inappropriate implementation in accessibility", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-6503" }, { "category": "external", "summary": "RHBZ#1844476", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1844476" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-6503", "url": "https://www.cve.org/CVERecord?id=CVE-2020-6503" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-6503", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-6503" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html" } ], "release_date": "2019-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T17:06:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: Inappropriate implementation in accessibility" }, { "cve": "CVE-2020-6504", "cwe": { "id": "CWE-358", "name": "Improperly Implemented Security Check for Standard" }, "discovery_date": "2020-06-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1844472" } ], "notes": [ { "category": "description", "text": "Insufficient policy enforcement in notifications in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to bypass notification restrictions via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Insufficient policy enforcement in notifications", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-6504" }, { "category": "external", "summary": "RHBZ#1844472", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1844472" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-6504", "url": "https://www.cve.org/CVERecord?id=CVE-2020-6504" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-6504", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-6504" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html" } ], "release_date": "2019-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T17:06:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "chromium-browser: Insufficient policy enforcement in notifications" } ] }
rhsa-2019:1021
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for chromium-browser is now available for Red Hat Enterprise Linux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Chromium is an open-source web browser, powered by WebKit (Blink).\n\nThis update upgrades Chromium to version 74.0.3729.108.\n\nSecurity Fix(es):\n\n* chromium-browser: Use after free in PDFium (CVE-2019-5805)\n\n* chromium-browser: Integer overflow in Angle (CVE-2019-5806)\n\n* chromium-browser: Memory corruption in V8 (CVE-2019-5807)\n\n* chromium-browser: Use after free in Blink (CVE-2019-5808)\n\n* chromium-browser: Use after free in Blink (CVE-2019-5809)\n\n* chromium-browser: User information disclosure in Autofill (CVE-2019-5810)\n\n* chromium-browser: CORS bypass in Blink (CVE-2019-5811)\n\n* chromium-browser: Out of bounds read in V8 (CVE-2019-5813)\n\n* chromium-browser: CORS bypass in Blink (CVE-2019-5814)\n\n* chromium-browser: Heap buffer overflow in Blink (CVE-2019-5815)\n\n* chromium-browser: Uninitialized value in media reader (CVE-2019-5818)\n\n* chromium-browser: Incorrect escaping in developer tools (CVE-2019-5819)\n\n* chromium-browser: Integer overflow in PDFium (CVE-2019-5820)\n\n* chromium-browser: Integer overflow in PDFium (CVE-2019-5821)\n\n* chromium-browser: CORS bypass in download manager (CVE-2019-5822)\n\n* chromium-browser: Forced navigation from service worker (CVE-2019-5823)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:1021", "url": "https://access.redhat.com/errata/RHSA-2019:1021" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1702895", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702895" }, { "category": "external", "summary": "1702896", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702896" }, { "category": "external", "summary": "1702897", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702897" }, { "category": "external", "summary": "1702898", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702898" }, { "category": "external", "summary": "1702899", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702899" }, { "category": "external", "summary": "1702900", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702900" }, { "category": "external", "summary": "1702901", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702901" }, { "category": "external", "summary": "1702903", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702903" }, { "category": "external", "summary": "1702904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702904" }, { "category": "external", "summary": "1702905", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702905" }, { "category": "external", "summary": "1702908", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702908" }, { "category": "external", "summary": "1702909", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702909" }, { "category": "external", "summary": "1702910", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702910" }, { "category": "external", "summary": "1702911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702911" }, { "category": "external", "summary": "1702912", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702912" }, { "category": "external", "summary": "1702913", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702913" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1021.json" } ], "title": "Red Hat Security Advisory: chromium-browser security update", "tracking": { "current_release_date": "2025-09-10T14:26:42+00:00", "generator": { "date": "2025-09-10T14:26:42+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2019:1021", "initial_release_date": "2019-05-07T17:06:08+00:00", "revision_history": [ { "date": "2019-05-07T17:06:08+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-05-07T17:06:08+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T14:26:42+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "product": { "name": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "product_id": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/chromium-browser-debuginfo@74.0.3729.108-1.el6_10?arch=x86_64" } } }, { "category": "product_version", "name": "chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "product": { "name": "chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "product_id": "chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/chromium-browser@74.0.3729.108-1.el6_10?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "product": { "name": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "product_id": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/chromium-browser-debuginfo@74.0.3729.108-1.el6_10?arch=i686" } } }, { "category": "product_version", "name": "chromium-browser-0:74.0.3729.108-1.el6_10.i686", "product": { "name": "chromium-browser-0:74.0.3729.108-1.el6_10.i686", "product_id": "chromium-browser-0:74.0.3729.108-1.el6_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/chromium-browser@74.0.3729.108-1.el6_10?arch=i686" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:74.0.3729.108-1.el6_10.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686" }, "product_reference": "chromium-browser-0:74.0.3729.108-1.el6_10.i686", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:74.0.3729.108-1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64" }, "product_reference": "chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686" }, "product_reference": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" }, "product_reference": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:74.0.3729.108-1.el6_10.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686" }, "product_reference": "chromium-browser-0:74.0.3729.108-1.el6_10.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:74.0.3729.108-1.el6_10.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64" }, "product_reference": "chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686" }, "product_reference": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" }, "product_reference": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:74.0.3729.108-1.el6_10.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686" }, "product_reference": "chromium-browser-0:74.0.3729.108-1.el6_10.i686", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:74.0.3729.108-1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64" }, "product_reference": "chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686" }, "product_reference": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" }, "product_reference": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:74.0.3729.108-1.el6_10.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686" }, "product_reference": "chromium-browser-0:74.0.3729.108-1.el6_10.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:74.0.3729.108-1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64" }, "product_reference": "chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686" }, "product_reference": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" }, "product_reference": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-5805", "discovery_date": "2019-04-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1702895" } ], "notes": [ { "category": "description", "text": "Use-after-free in PDFium in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Use after free in PDFium", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5805" }, { "category": "external", "summary": "RHBZ#1702895", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702895" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5805", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5805" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5805", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5805" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html" } ], "release_date": "2019-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T17:06:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: Use after free in PDFium" }, { "cve": "CVE-2019-5806", "discovery_date": "2019-04-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1702896" } ], "notes": [ { "category": "description", "text": "Integer overflow in ANGLE in Google Chrome on Windows prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Integer overflow in Angle", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5806" }, { "category": "external", "summary": "RHBZ#1702896", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702896" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5806", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5806" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5806", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5806" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html" } ], "release_date": "2019-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T17:06:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: Integer overflow in Angle" }, { "cve": "CVE-2019-5807", "discovery_date": "2019-04-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1702897" } ], "notes": [ { "category": "description", "text": "Object lifetime issue in V8 in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Memory corruption in V8", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5807" }, { "category": "external", "summary": "RHBZ#1702897", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702897" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5807", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5807" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5807", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5807" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html" } ], "release_date": "2019-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T17:06:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: Memory corruption in V8" }, { "cve": "CVE-2019-5808", "discovery_date": "2019-04-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1702898" } ], "notes": [ { "category": "description", "text": "Use after free in Blink in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Use after free in Blink", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5808" }, { "category": "external", "summary": "RHBZ#1702898", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702898" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5808", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5808" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5808", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5808" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html" } ], "release_date": "2019-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T17:06:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: Use after free in Blink" }, { "cve": "CVE-2019-5809", "discovery_date": "2019-04-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1702899" } ], "notes": [ { "category": "description", "text": "Use after free in file chooser in Google Chrome prior to 74.0.3729.108 allowed a remote attacker who had compromised the renderer process to perform privilege escalation via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Use after free in Blink", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5809" }, { "category": "external", "summary": "RHBZ#1702899", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702899" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5809", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5809" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5809", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5809" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html" } ], "release_date": "2019-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T17:06:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: Use after free in Blink" }, { "cve": "CVE-2019-5810", "discovery_date": "2019-04-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1702900" } ], "notes": [ { "category": "description", "text": "Information leak in autofill in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: User information disclosure in Autofill", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5810" }, { "category": "external", "summary": "RHBZ#1702900", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702900" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5810", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5810" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5810", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5810" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html" } ], "release_date": "2019-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T17:06:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: User information disclosure in Autofill" }, { "cve": "CVE-2019-5811", "discovery_date": "2019-04-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1702901" } ], "notes": [ { "category": "description", "text": "Incorrect handling of CORS in ServiceWorker in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to bypass same origin policy via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: CORS bypass in Blink", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5811" }, { "category": "external", "summary": "RHBZ#1702901", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702901" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5811", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5811" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5811", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5811" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html" } ], "release_date": "2019-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T17:06:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: CORS bypass in Blink" }, { "cve": "CVE-2019-5813", "discovery_date": "2019-04-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1702903" } ], "notes": [ { "category": "description", "text": "Use after free in V8 in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Out of bounds read in V8", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5813" }, { "category": "external", "summary": "RHBZ#1702903", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702903" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5813", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5813" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5813", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5813" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html" } ], "release_date": "2019-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T17:06:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: Out of bounds read in V8" }, { "cve": "CVE-2019-5814", "discovery_date": "2019-04-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1702904" } ], "notes": [ { "category": "description", "text": "Insufficient policy enforcement in Blink in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to leak cross-origin data via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: CORS bypass in Blink", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5814" }, { "category": "external", "summary": "RHBZ#1702904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702904" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5814", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5814" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5814", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5814" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html" } ], "release_date": "2019-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T17:06:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: CORS bypass in Blink" }, { "cve": "CVE-2019-5815", "discovery_date": "2019-04-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1702905" } ], "notes": [ { "category": "description", "text": "Type confusion in xsltNumberFormatGetMultipleLevel prior to libxslt 1.1.33 could allow attackers to potentially exploit heap corruption via crafted XML data.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Heap buffer overflow in Blink", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5815" }, { "category": "external", "summary": "RHBZ#1702905", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702905" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5815", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5815" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5815", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5815" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html" } ], "release_date": "2019-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T17:06:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: Heap buffer overflow in Blink" }, { "cve": "CVE-2019-5818", "discovery_date": "2019-04-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1702908" } ], "notes": [ { "category": "description", "text": "Uninitialized data in media in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted video file.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Uninitialized value in media reader", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5818" }, { "category": "external", "summary": "RHBZ#1702908", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702908" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5818", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5818" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5818", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5818" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html" } ], "release_date": "2019-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T17:06:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: Uninitialized value in media reader" }, { "cve": "CVE-2019-5819", "discovery_date": "2019-04-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1702909" } ], "notes": [ { "category": "description", "text": "Insufficient data validation in developer tools in Google Chrome on OS X prior to 74.0.3729.108 allowed a local attacker to execute arbitrary code via a crafted string copied to clipboard.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Incorrect escaping in developer tools", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5819" }, { "category": "external", "summary": "RHBZ#1702909", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702909" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5819", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5819" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5819", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5819" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html" } ], "release_date": "2019-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T17:06:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: Incorrect escaping in developer tools" }, { "cve": "CVE-2019-5820", "discovery_date": "2019-04-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1702910" } ], "notes": [ { "category": "description", "text": "Integer overflow in PDFium in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Integer overflow in PDFium", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5820" }, { "category": "external", "summary": "RHBZ#1702910", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702910" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5820", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5820" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5820", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5820" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html" } ], "release_date": "2019-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T17:06:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: Integer overflow in PDFium" }, { "cve": "CVE-2019-5821", "discovery_date": "2019-04-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1702911" } ], "notes": [ { "category": "description", "text": "Integer overflow in PDFium in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Integer overflow in PDFium", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5821" }, { "category": "external", "summary": "RHBZ#1702911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702911" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5821", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5821" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5821", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5821" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html" } ], "release_date": "2019-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T17:06:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: Integer overflow in PDFium" }, { "cve": "CVE-2019-5822", "discovery_date": "2019-04-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1702912" } ], "notes": [ { "category": "description", "text": "Inappropriate implementation in Blink in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to bypass same origin policy via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: CORS bypass in download manager", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5822" }, { "category": "external", "summary": "RHBZ#1702912", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702912" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5822", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5822" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5822", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5822" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html" } ], "release_date": "2019-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T17:06:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "chromium-browser: CORS bypass in download manager" }, { "cve": "CVE-2019-5823", "discovery_date": "2019-04-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1702913" } ], "notes": [ { "category": "description", "text": "Insufficient policy enforcement in service workers in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Forced navigation from service worker", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5823" }, { "category": "external", "summary": "RHBZ#1702913", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702913" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5823", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5823" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5823", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5823" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html" } ], "release_date": "2019-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T17:06:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "chromium-browser: Forced navigation from service worker" }, { "cve": "CVE-2019-5825", "discovery_date": "2019-05-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1707247" } ], "notes": [ { "category": "description", "text": "Out of bounds write in JavaScript in Google Chrome prior to 73.0.3683.86 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Out-of-bounds write in V8", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5825" }, { "category": "external", "summary": "RHBZ#1707247", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1707247" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5825", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5825" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5825", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5825" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_30.html", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_30.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2019-04-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T17:06:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-06-08T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "chromium-browser: Out-of-bounds write in V8" }, { "cve": "CVE-2019-5826", "discovery_date": "2019-05-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1707248" } ], "notes": [ { "category": "description", "text": "Use after free in IndexedDB in Google Chrome prior to 73.0.3683.86 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Use-after-free in IndexedDB", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5826" }, { "category": "external", "summary": "RHBZ#1707248", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1707248" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5826", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5826" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5826", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5826" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_30.html", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_30.html" } ], "release_date": "2019-04-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T17:06:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: Use-after-free in IndexedDB" }, { "cve": "CVE-2020-6503", "cwe": { "id": "CWE-358", "name": "Improperly Implemented Security Check for Standard" }, "discovery_date": "2020-06-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1844476" } ], "notes": [ { "category": "description", "text": "Inappropriate implementation in accessibility in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Inappropriate implementation in accessibility", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-6503" }, { "category": "external", "summary": "RHBZ#1844476", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1844476" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-6503", "url": "https://www.cve.org/CVERecord?id=CVE-2020-6503" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-6503", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-6503" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html" } ], "release_date": "2019-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T17:06:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: Inappropriate implementation in accessibility" }, { "cve": "CVE-2020-6504", "cwe": { "id": "CWE-358", "name": "Improperly Implemented Security Check for Standard" }, "discovery_date": "2020-06-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1844472" } ], "notes": [ { "category": "description", "text": "Insufficient policy enforcement in notifications in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to bypass notification restrictions via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Insufficient policy enforcement in notifications", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-6504" }, { "category": "external", "summary": "RHBZ#1844472", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1844472" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-6504", "url": "https://www.cve.org/CVERecord?id=CVE-2020-6504" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-6504", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-6504" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html" } ], "release_date": "2019-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T17:06:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "chromium-browser: Insufficient policy enforcement in notifications" } ] }
rhsa-2019_1021
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for chromium-browser is now available for Red Hat Enterprise Linux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Chromium is an open-source web browser, powered by WebKit (Blink).\n\nThis update upgrades Chromium to version 74.0.3729.108.\n\nSecurity Fix(es):\n\n* chromium-browser: Use after free in PDFium (CVE-2019-5805)\n\n* chromium-browser: Integer overflow in Angle (CVE-2019-5806)\n\n* chromium-browser: Memory corruption in V8 (CVE-2019-5807)\n\n* chromium-browser: Use after free in Blink (CVE-2019-5808)\n\n* chromium-browser: Use after free in Blink (CVE-2019-5809)\n\n* chromium-browser: User information disclosure in Autofill (CVE-2019-5810)\n\n* chromium-browser: CORS bypass in Blink (CVE-2019-5811)\n\n* chromium-browser: Out of bounds read in V8 (CVE-2019-5813)\n\n* chromium-browser: CORS bypass in Blink (CVE-2019-5814)\n\n* chromium-browser: Heap buffer overflow in Blink (CVE-2019-5815)\n\n* chromium-browser: Uninitialized value in media reader (CVE-2019-5818)\n\n* chromium-browser: Incorrect escaping in developer tools (CVE-2019-5819)\n\n* chromium-browser: Integer overflow in PDFium (CVE-2019-5820)\n\n* chromium-browser: Integer overflow in PDFium (CVE-2019-5821)\n\n* chromium-browser: CORS bypass in download manager (CVE-2019-5822)\n\n* chromium-browser: Forced navigation from service worker (CVE-2019-5823)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:1021", "url": "https://access.redhat.com/errata/RHSA-2019:1021" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1702895", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702895" }, { "category": "external", "summary": "1702896", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702896" }, { "category": "external", "summary": "1702897", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702897" }, { "category": "external", "summary": "1702898", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702898" }, { "category": "external", "summary": "1702899", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702899" }, { "category": "external", "summary": "1702900", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702900" }, { "category": "external", "summary": "1702901", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702901" }, { "category": "external", "summary": "1702903", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702903" }, { "category": "external", "summary": "1702904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702904" }, { "category": "external", "summary": "1702905", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702905" }, { "category": "external", "summary": "1702908", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702908" }, { "category": "external", "summary": "1702909", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702909" }, { "category": "external", "summary": "1702910", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702910" }, { "category": "external", "summary": "1702911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702911" }, { "category": "external", "summary": "1702912", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702912" }, { "category": "external", "summary": "1702913", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702913" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1021.json" } ], "title": "Red Hat Security Advisory: chromium-browser security update", "tracking": { "current_release_date": "2024-11-15T09:30:54+00:00", "generator": { "date": "2024-11-15T09:30:54+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2019:1021", "initial_release_date": "2019-05-07T17:06:08+00:00", "revision_history": [ { "date": "2019-05-07T17:06:08+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-05-07T17:06:08+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T09:30:54+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "product": { "name": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "product_id": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/chromium-browser-debuginfo@74.0.3729.108-1.el6_10?arch=x86_64" } } }, { "category": "product_version", "name": "chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "product": { "name": "chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "product_id": "chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/chromium-browser@74.0.3729.108-1.el6_10?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "product": { "name": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "product_id": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/chromium-browser-debuginfo@74.0.3729.108-1.el6_10?arch=i686" } } }, { "category": "product_version", "name": "chromium-browser-0:74.0.3729.108-1.el6_10.i686", "product": { "name": "chromium-browser-0:74.0.3729.108-1.el6_10.i686", "product_id": "chromium-browser-0:74.0.3729.108-1.el6_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/chromium-browser@74.0.3729.108-1.el6_10?arch=i686" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:74.0.3729.108-1.el6_10.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686" }, "product_reference": "chromium-browser-0:74.0.3729.108-1.el6_10.i686", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:74.0.3729.108-1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64" }, "product_reference": "chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686" }, "product_reference": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" }, "product_reference": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:74.0.3729.108-1.el6_10.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686" }, "product_reference": "chromium-browser-0:74.0.3729.108-1.el6_10.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:74.0.3729.108-1.el6_10.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64" }, "product_reference": "chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686" }, "product_reference": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" }, "product_reference": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:74.0.3729.108-1.el6_10.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686" }, "product_reference": "chromium-browser-0:74.0.3729.108-1.el6_10.i686", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:74.0.3729.108-1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64" }, "product_reference": "chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686" }, "product_reference": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" }, "product_reference": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:74.0.3729.108-1.el6_10.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686" }, "product_reference": "chromium-browser-0:74.0.3729.108-1.el6_10.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:74.0.3729.108-1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64" }, "product_reference": "chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686" }, "product_reference": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" }, "product_reference": "chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-5805", "discovery_date": "2019-04-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1702895" } ], "notes": [ { "category": "description", "text": "Use-after-free in PDFium in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Use after free in PDFium", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5805" }, { "category": "external", "summary": "RHBZ#1702895", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702895" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5805", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5805" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5805", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5805" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html" } ], "release_date": "2019-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T17:06:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: Use after free in PDFium" }, { "cve": "CVE-2019-5806", "discovery_date": "2019-04-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1702896" } ], "notes": [ { "category": "description", "text": "Integer overflow in ANGLE in Google Chrome on Windows prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Integer overflow in Angle", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5806" }, { "category": "external", "summary": "RHBZ#1702896", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702896" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5806", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5806" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5806", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5806" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html" } ], "release_date": "2019-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T17:06:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: Integer overflow in Angle" }, { "cve": "CVE-2019-5807", "discovery_date": "2019-04-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1702897" } ], "notes": [ { "category": "description", "text": "Object lifetime issue in V8 in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Memory corruption in V8", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5807" }, { "category": "external", "summary": "RHBZ#1702897", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702897" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5807", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5807" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5807", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5807" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html" } ], "release_date": "2019-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T17:06:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: Memory corruption in V8" }, { "cve": "CVE-2019-5808", "discovery_date": "2019-04-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1702898" } ], "notes": [ { "category": "description", "text": "Use after free in Blink in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Use after free in Blink", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5808" }, { "category": "external", "summary": "RHBZ#1702898", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702898" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5808", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5808" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5808", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5808" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html" } ], "release_date": "2019-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T17:06:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: Use after free in Blink" }, { "cve": "CVE-2019-5809", "discovery_date": "2019-04-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1702899" } ], "notes": [ { "category": "description", "text": "Use after free in file chooser in Google Chrome prior to 74.0.3729.108 allowed a remote attacker who had compromised the renderer process to perform privilege escalation via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Use after free in Blink", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5809" }, { "category": "external", "summary": "RHBZ#1702899", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702899" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5809", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5809" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5809", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5809" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html" } ], "release_date": "2019-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T17:06:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: Use after free in Blink" }, { "cve": "CVE-2019-5810", "discovery_date": "2019-04-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1702900" } ], "notes": [ { "category": "description", "text": "Information leak in autofill in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: User information disclosure in Autofill", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5810" }, { "category": "external", "summary": "RHBZ#1702900", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702900" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5810", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5810" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5810", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5810" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html" } ], "release_date": "2019-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T17:06:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: User information disclosure in Autofill" }, { "cve": "CVE-2019-5811", "discovery_date": "2019-04-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1702901" } ], "notes": [ { "category": "description", "text": "Incorrect handling of CORS in ServiceWorker in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to bypass same origin policy via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: CORS bypass in Blink", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5811" }, { "category": "external", "summary": "RHBZ#1702901", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702901" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5811", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5811" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5811", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5811" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html" } ], "release_date": "2019-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T17:06:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: CORS bypass in Blink" }, { "cve": "CVE-2019-5813", "discovery_date": "2019-04-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1702903" } ], "notes": [ { "category": "description", "text": "Use after free in V8 in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Out of bounds read in V8", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5813" }, { "category": "external", "summary": "RHBZ#1702903", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702903" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5813", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5813" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5813", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5813" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html" } ], "release_date": "2019-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T17:06:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: Out of bounds read in V8" }, { "cve": "CVE-2019-5814", "discovery_date": "2019-04-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1702904" } ], "notes": [ { "category": "description", "text": "Insufficient policy enforcement in Blink in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to leak cross-origin data via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: CORS bypass in Blink", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5814" }, { "category": "external", "summary": "RHBZ#1702904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702904" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5814", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5814" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5814", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5814" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html" } ], "release_date": "2019-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T17:06:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: CORS bypass in Blink" }, { "cve": "CVE-2019-5815", "discovery_date": "2019-04-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1702905" } ], "notes": [ { "category": "description", "text": "Type confusion in xsltNumberFormatGetMultipleLevel prior to libxslt 1.1.33 could allow attackers to potentially exploit heap corruption via crafted XML data.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Heap buffer overflow in Blink", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5815" }, { "category": "external", "summary": "RHBZ#1702905", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702905" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5815", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5815" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5815", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5815" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html" } ], "release_date": "2019-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T17:06:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: Heap buffer overflow in Blink" }, { "cve": "CVE-2019-5818", "discovery_date": "2019-04-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1702908" } ], "notes": [ { "category": "description", "text": "Uninitialized data in media in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted video file.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Uninitialized value in media reader", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5818" }, { "category": "external", "summary": "RHBZ#1702908", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702908" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5818", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5818" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5818", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5818" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html" } ], "release_date": "2019-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T17:06:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: Uninitialized value in media reader" }, { "cve": "CVE-2019-5819", "discovery_date": "2019-04-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1702909" } ], "notes": [ { "category": "description", "text": "Insufficient data validation in developer tools in Google Chrome on OS X prior to 74.0.3729.108 allowed a local attacker to execute arbitrary code via a crafted string copied to clipboard.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Incorrect escaping in developer tools", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5819" }, { "category": "external", "summary": "RHBZ#1702909", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702909" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5819", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5819" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5819", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5819" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html" } ], "release_date": "2019-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T17:06:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: Incorrect escaping in developer tools" }, { "cve": "CVE-2019-5820", "discovery_date": "2019-04-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1702910" } ], "notes": [ { "category": "description", "text": "Integer overflow in PDFium in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Integer overflow in PDFium", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5820" }, { "category": "external", "summary": "RHBZ#1702910", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702910" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5820", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5820" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5820", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5820" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html" } ], "release_date": "2019-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T17:06:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: Integer overflow in PDFium" }, { "cve": "CVE-2019-5821", "discovery_date": "2019-04-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1702911" } ], "notes": [ { "category": "description", "text": "Integer overflow in PDFium in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Integer overflow in PDFium", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5821" }, { "category": "external", "summary": "RHBZ#1702911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702911" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5821", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5821" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5821", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5821" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html" } ], "release_date": "2019-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T17:06:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: Integer overflow in PDFium" }, { "cve": "CVE-2019-5822", "discovery_date": "2019-04-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1702912" } ], "notes": [ { "category": "description", "text": "Inappropriate implementation in Blink in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to bypass same origin policy via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: CORS bypass in download manager", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5822" }, { "category": "external", "summary": "RHBZ#1702912", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702912" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5822", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5822" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5822", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5822" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html" } ], "release_date": "2019-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T17:06:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "chromium-browser: CORS bypass in download manager" }, { "cve": "CVE-2019-5823", "discovery_date": "2019-04-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1702913" } ], "notes": [ { "category": "description", "text": "Insufficient policy enforcement in service workers in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Forced navigation from service worker", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5823" }, { "category": "external", "summary": "RHBZ#1702913", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702913" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5823", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5823" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5823", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5823" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html" } ], "release_date": "2019-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T17:06:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "chromium-browser: Forced navigation from service worker" }, { "cve": "CVE-2019-5825", "discovery_date": "2019-05-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1707247" } ], "notes": [ { "category": "description", "text": "Out of bounds write in JavaScript in Google Chrome prior to 73.0.3683.86 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Out-of-bounds write in V8", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5825" }, { "category": "external", "summary": "RHBZ#1707247", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1707247" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5825", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5825" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5825", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5825" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_30.html", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_30.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2019-04-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T17:06:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-06-08T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "chromium-browser: Out-of-bounds write in V8" }, { "cve": "CVE-2019-5826", "discovery_date": "2019-05-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1707248" } ], "notes": [ { "category": "description", "text": "Use after free in IndexedDB in Google Chrome prior to 73.0.3683.86 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Use-after-free in IndexedDB", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5826" }, { "category": "external", "summary": "RHBZ#1707248", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1707248" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5826", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5826" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5826", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5826" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_30.html", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_30.html" } ], "release_date": "2019-04-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T17:06:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: Use-after-free in IndexedDB" }, { "cve": "CVE-2020-6503", "cwe": { "id": "CWE-358", "name": "Improperly Implemented Security Check for Standard" }, "discovery_date": "2020-06-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1844476" } ], "notes": [ { "category": "description", "text": "Inappropriate implementation in accessibility in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Inappropriate implementation in accessibility", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-6503" }, { "category": "external", "summary": "RHBZ#1844476", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1844476" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-6503", "url": "https://www.cve.org/CVERecord?id=CVE-2020-6503" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-6503", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-6503" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html" } ], "release_date": "2019-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T17:06:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: Inappropriate implementation in accessibility" }, { "cve": "CVE-2020-6504", "cwe": { "id": "CWE-358", "name": "Improperly Implemented Security Check for Standard" }, "discovery_date": "2020-06-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1844472" } ], "notes": [ { "category": "description", "text": "Insufficient policy enforcement in notifications in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to bypass notification restrictions via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Insufficient policy enforcement in notifications", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-6504" }, { "category": "external", "summary": "RHBZ#1844472", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1844472" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-6504", "url": "https://www.cve.org/CVERecord?id=CVE-2020-6504" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-6504", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-6504" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html" } ], "release_date": "2019-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T17:06:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:74.0.3729.108-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:74.0.3729.108-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "chromium-browser: Insufficient policy enforcement in notifications" } ] }
fkie_cve-2019-5825
Vulnerability from fkie_nvd
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
▼ | URL | Tags | |
---|---|---|---|
chrome-cve-admin@google.com | http://packetstormsecurity.com/files/156641/Google-Chrome-72-73-Array.map-Corruption.html | Exploit, Third Party Advisory, VDB Entry | |
chrome-cve-admin@google.com | https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_30.html | Release Notes, Vendor Advisory | |
chrome-cve-admin@google.com | https://crbug.com/941743 | Exploit, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/156641/Google-Chrome-72-73-Array.map-Corruption.html | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_30.html | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://crbug.com/941743 | Exploit, Patch, Third Party Advisory |
{ "cisaActionDue": "2022-06-22", "cisaExploitAdd": "2022-06-08", "cisaRequiredAction": "Apply updates per vendor instructions.", "cisaVulnerabilityName": "Google Chromium V8 Out-of-Bounds Write Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "062592A4-5D86-4AF9-A0AD-3267C81147F9", "versionEndExcluding": "73.0.3683.86", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Out of bounds write in JavaScript in Google Chrome prior to 73.0.3683.86 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page." }, { "lang": "es", "value": "Una escritura fuera de l\u00edmites en JavaScript en Google Chrome versiones anteriores a 73.0.3683.86, permiti\u00f3 a un atacante remoto, explotar potencialmente una corrupci\u00f3n de la pila por medio de una p\u00e1gina HTML dise\u00f1ada." } ], "id": "CVE-2019-5825", "lastModified": "2025-02-04T18:24:48.320", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2019-11-25T20:15:11.483", "references": [ { "source": "chrome-cve-admin@google.com", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/156641/Google-Chrome-72-73-Array.map-Corruption.html" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_30.html" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://crbug.com/941743" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/156641/Google-Chrome-72-73-Array.map-Corruption.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_30.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://crbug.com/941743" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
ghsa-3xc7-8f3r-h948
Vulnerability from github
Out of bounds write in JavaScript in Google Chrome prior to 73.0.3683.86 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
{ "affected": [], "aliases": [ "CVE-2019-5825" ], "database_specific": { "cwe_ids": [ "CWE-787" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2019-11-25T20:15:00Z", "severity": "MODERATE" }, "details": "Out of bounds write in JavaScript in Google Chrome prior to 73.0.3683.86 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "id": "GHSA-3xc7-8f3r-h948", "modified": "2022-10-08T00:00:28Z", "published": "2022-05-24T17:02:01Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5825" }, { "type": "WEB", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_30.html" }, { "type": "WEB", "url": "https://crbug.com/941743" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/156641/Google-Chrome-72-73-Array.map-Corruption.html" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
cnvd-2019-13255
Vulnerability from cnvd
Title: Google Chrome V8越界写入漏洞
Description:
Google Chrome是美国谷歌(Google)公司的一款Web浏览器。V8是其中的一套开源JavaScript引擎。
Google Chrome 74.0.3729.131之前版本中的V8存在越界写入漏洞,该漏洞源于网络系统或产品在内存上执行操作时,未正确验证数据边界,导致向关联的其他内存位置上执行了错误的读写操作,攻击者可利用该漏洞导致缓冲区溢出或堆溢出等。
Severity: 中
Patch Name: Google Chrome V8越界写入漏洞的补丁
Patch Description:
Google Chrome是美国谷歌(Google)公司的一款Web浏览器。V8是其中的一套开源JavaScript引擎。
Google Chrome 74.0.3729.131之前版本中的V8存在越界写入漏洞,该漏洞源于网络系统或产品在内存上执行操作时,未正确验证数据边界,导致向关联的其他内存位置上执行了错误的读写操作,攻击者可利用该漏洞导致缓冲区溢出或堆溢出等。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
厂商已发布了漏洞修复程序,请及时关注更新: https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_30.html
Reference: https://vigilance.fr/vulnerability/Google-Chrome-four-vulnerabilities-29214
Name | Google Chrome V8 <74.0.3729.131 |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2019-5825" } }, "description": "Google Chrome\u662f\u7f8e\u56fd\u8c37\u6b4c\uff08Google\uff09\u516c\u53f8\u7684\u4e00\u6b3eWeb\u6d4f\u89c8\u5668\u3002V8\u662f\u5176\u4e2d\u7684\u4e00\u5957\u5f00\u6e90JavaScript\u5f15\u64ce\u3002\n\nGoogle Chrome 74.0.3729.131\u4e4b\u524d\u7248\u672c\u4e2d\u7684V8\u5b58\u5728\u8d8a\u754c\u5199\u5165\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7f51\u7edc\u7cfb\u7edf\u6216\u4ea7\u54c1\u5728\u5185\u5b58\u4e0a\u6267\u884c\u64cd\u4f5c\u65f6\uff0c\u672a\u6b63\u786e\u9a8c\u8bc1\u6570\u636e\u8fb9\u754c\uff0c\u5bfc\u81f4\u5411\u5173\u8054\u7684\u5176\u4ed6\u5185\u5b58\u4f4d\u7f6e\u4e0a\u6267\u884c\u4e86\u9519\u8bef\u7684\u8bfb\u5199\u64cd\u4f5c\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u7f13\u51b2\u533a\u6ea2\u51fa\u6216\u5806\u6ea2\u51fa\u7b49\u3002", "discovererName": "unknown", "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_30.html", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2019-13255", "openTime": "2019-05-07", "patchDescription": "Google Chrome\u662f\u7f8e\u56fd\u8c37\u6b4c\uff08Google\uff09\u516c\u53f8\u7684\u4e00\u6b3eWeb\u6d4f\u89c8\u5668\u3002V8\u662f\u5176\u4e2d\u7684\u4e00\u5957\u5f00\u6e90JavaScript\u5f15\u64ce\u3002\r\n\r\nGoogle Chrome 74.0.3729.131\u4e4b\u524d\u7248\u672c\u4e2d\u7684V8\u5b58\u5728\u8d8a\u754c\u5199\u5165\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7f51\u7edc\u7cfb\u7edf\u6216\u4ea7\u54c1\u5728\u5185\u5b58\u4e0a\u6267\u884c\u64cd\u4f5c\u65f6\uff0c\u672a\u6b63\u786e\u9a8c\u8bc1\u6570\u636e\u8fb9\u754c\uff0c\u5bfc\u81f4\u5411\u5173\u8054\u7684\u5176\u4ed6\u5185\u5b58\u4f4d\u7f6e\u4e0a\u6267\u884c\u4e86\u9519\u8bef\u7684\u8bfb\u5199\u64cd\u4f5c\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u7f13\u51b2\u533a\u6ea2\u51fa\u6216\u5806\u6ea2\u51fa\u7b49\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "Google Chrome V8\u8d8a\u754c\u5199\u5165\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": "Google Chrome V8 \u003c74.0.3729.131" }, "referenceLink": "https://vigilance.fr/vulnerability/Google-Chrome-four-vulnerabilities-29214", "serverity": "\u4e2d", "submitTime": "2019-05-06", "title": "Google Chrome V8\u8d8a\u754c\u5199\u5165\u6f0f\u6d1e" }
gsd-2019-5825
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2019-5825", "description": "Out of bounds write in JavaScript in Google Chrome prior to 73.0.3683.86 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "id": "GSD-2019-5825", "references": [ "https://www.suse.com/security/cve/CVE-2019-5825.html", "https://www.debian.org/security/2019/dsa-4500", "https://access.redhat.com/errata/RHSA-2019:1021", "https://advisories.mageia.org/CVE-2019-5825.html", "https://packetstormsecurity.com/files/cve/CVE-2019-5825" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2019-5825" ], "details": "Out of bounds write in JavaScript in Google Chrome prior to 73.0.3683.86 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "id": "GSD-2019-5825", "modified": "2023-12-13T01:23:55.038903Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "chrome-cve-admin@google.com", "ID": "CVE-2019-5825", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Chrome", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "73.0.3683.86" } ] } } ] }, "vendor_name": "Google" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Out of bounds write in JavaScript in Google Chrome prior to 73.0.3683.86 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out of bounds write" } ] } ] }, "references": { "reference_data": [ { "name": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_30.html", "refsource": "MISC", "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_30.html" }, { "name": "https://crbug.com/941743", "refsource": "MISC", "url": "https://crbug.com/941743" }, { "name": "http://packetstormsecurity.com/files/156641/Google-Chrome-72-73-Array.map-Corruption.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/156641/Google-Chrome-72-73-Array.map-Corruption.html" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "73.0.3683.86", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "chrome-cve-admin@google.com", "ID": "CVE-2019-5825" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Out of bounds write in JavaScript in Google Chrome prior to 73.0.3683.86 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-787" } ] } ] }, "references": { "reference_data": [ { "name": "https://crbug.com/941743", "refsource": "MISC", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://crbug.com/941743" }, { "name": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_30.html", "refsource": "MISC", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_30.html" }, { "name": "http://packetstormsecurity.com/files/156641/Google-Chrome-72-73-Array.map-Corruption.html", "refsource": "MISC", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/156641/Google-Chrome-72-73-Array.map-Corruption.html" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": true }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6 } }, "lastModifiedDate": "2022-10-07T18:57Z", "publishedDate": "2019-11-25T20:15Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.