RHSA-2018_3803

Vulnerability from csaf_redhat - Published: 2018-12-10 10:34 - Updated: 2024-11-15 00:38
Summary
Red Hat Security Advisory: chromium-browser security update
Severity
Important
Notes
Topic: An update for chromium-browser is now available for Red Hat Enterprise Linux 6 Supplementary. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details: Chromium is an open-source web browser, powered by WebKit (Blink). This update upgrades Chromium to version 71.0.3578.80. Security Fix(es): * chromium-browser: Out of bounds write in V8 (CVE-2018-17480) * chromium-browser: Use after frees in PDFium (CVE-2018-17481) * chromium-browser: Heap buffer overflow in Skia (CVE-2018-18335) * chromium-browser: Use after free in PDFium (CVE-2018-18336) * chromium-browser: Use after free in Blink (CVE-2018-18337) * chromium-browser: Heap buffer overflow in Canvas (CVE-2018-18338) * chromium-browser: Use after free in WebAudio (CVE-2018-18339) * chromium-browser: Use after free in MediaRecorder (CVE-2018-18340) * chromium-browser: Heap buffer overflow in Blink (CVE-2018-18341) * chromium-browser: Out of bounds write in V8 (CVE-2018-18342) * chromium-browser: Use after free in Skia (CVE-2018-18343) * chromium-browser: Inappropriate implementation in Extensions (CVE-2018-18344) * chromium-browser: Inappropriate implementation in Site Isolation (CVE-2018-18345) * chromium-browser: Incorrect security UI in Blink (CVE-2018-18346) * chromium-browser: Inappropriate implementation in Navigation (CVE-2018-18347) * chromium-browser: Inappropriate implementation in Omnibox (CVE-2018-18348) * chromium-browser: Insufficient policy enforcement in Blink (CVE-2018-18349) * chromium-browser: Insufficient policy enforcement in Blink (CVE-2018-18350) * chromium-browser: Insufficient policy enforcement in Navigation (CVE-2018-18351) * chromium-browser: Inappropriate implementation in Media (CVE-2018-18352) * chromium-browser: Inappropriate implementation in Network Authentication (CVE-2018-18353) * chromium-browser: Insufficient data validation in Shell Integration (CVE-2018-18354) * chromium-browser: Insufficient policy enforcement in URL Formatter (CVE-2018-18355) * chromium-browser: Use after free in Skia (CVE-2018-18356) * chromium-browser: Insufficient policy enforcement in URL Formatter (CVE-2018-18357) * chromium-browser: Insufficient policy enforcement in Proxy (CVE-2018-18358) * chromium-browser: Out of bounds read in V8 (CVE-2018-18359) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use: This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Execution of user supplied Javascript during array deserialization leading to an out of bounds write in V8 in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.

Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, Chromium must be restarted for the changes to take effect. https://access.redhat.com/errata/RHSA-2018:3803

Incorrect object lifecycle handling in PDFium in Google Chrome prior to 71.0.3578.98 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.

Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, Chromium must be restarted for the changes to take effect. https://access.redhat.com/errata/RHSA-2018:3803

Heap buffer overflow in Skia in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, Chromium must be restarted for the changes to take effect. https://access.redhat.com/errata/RHSA-2018:3803

Incorrect object lifecycle in PDFium in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.

Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, Chromium must be restarted for the changes to take effect. https://access.redhat.com/errata/RHSA-2018:3803

Incorrect handling of stylesheets leading to a use after free in Blink in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, Chromium must be restarted for the changes to take effect. https://access.redhat.com/errata/RHSA-2018:3803

Incorrect, thread-unsafe use of SkImage in Canvas in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, Chromium must be restarted for the changes to take effect. https://access.redhat.com/errata/RHSA-2018:3803

Incorrect object lifecycle in WebAudio in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, Chromium must be restarted for the changes to take effect. https://access.redhat.com/errata/RHSA-2018:3803

Incorrect object lifecycle in MediaRecorder in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, Chromium must be restarted for the changes to take effect. https://access.redhat.com/errata/RHSA-2018:3803

An integer overflow leading to a heap buffer overflow in Blink in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, Chromium must be restarted for the changes to take effect. https://access.redhat.com/errata/RHSA-2018:3803

Execution of user supplied Javascript during object deserialization can update object length leading to an out of bounds write in V8 in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.

Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, Chromium must be restarted for the changes to take effect. https://access.redhat.com/errata/RHSA-2018:3803

Incorrect handing of paths leading to a use after free in Skia in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, Chromium must be restarted for the changes to take effect. https://access.redhat.com/errata/RHSA-2018:3803

Inappropriate allowance of the setDownloadBehavior devtools protocol feature in Extensions in Google Chrome prior to 71.0.3578.80 allowed a remote attacker with control of an installed extension to access files on the local file system via a crafted Chrome Extension.

Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, Chromium must be restarted for the changes to take effect. https://access.redhat.com/errata/RHSA-2018:3803

Incorrect handling of blob URLS in Site Isolation in Google Chrome prior to 71.0.3578.80 allowed a remote attacker who had compromised the renderer process to bypass site isolation protections via a crafted HTML page.

Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, Chromium must be restarted for the changes to take effect. https://access.redhat.com/errata/RHSA-2018:3803

Incorrect handling of alert box display in Blink in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to present confusing browser UI via a crafted HTML page.

Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, Chromium must be restarted for the changes to take effect. https://access.redhat.com/errata/RHSA-2018:3803

Incorrect handling of failed navigations with invalid URLs in Navigation in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to trick a user into executing javascript in an arbitrary origin via a crafted HTML page.

Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, Chromium must be restarted for the changes to take effect. https://access.redhat.com/errata/RHSA-2018:3803

Incorrect handling of bidirectional domain names with RTL characters in Omnibox in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.

Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, Chromium must be restarted for the changes to take effect. https://access.redhat.com/errata/RHSA-2018:3803

Remote frame navigations was incorrectly permitted to local resources in Blink in Google Chrome prior to 71.0.3578.80 allowed an attacker who convinced a user to install a malicious extension to access files on the local file system via a crafted Chrome Extension.

Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, Chromium must be restarted for the changes to take effect. https://access.redhat.com/errata/RHSA-2018:3803

Incorrect handling of CSP enforcement during navigations in Blink in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to bypass content security policy via a crafted HTML page.

Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, Chromium must be restarted for the changes to take effect. https://access.redhat.com/errata/RHSA-2018:3803

Lack of proper validation of ancestor frames site when sending lax cookies in Navigation in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to bypass SameSite cookie policy via a crafted HTML page.

Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, Chromium must be restarted for the changes to take effect. https://access.redhat.com/errata/RHSA-2018:3803

Service works could inappropriately gain access to cross origin audio in Media in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to bypass same origin policy for audio content via a crafted HTML page.

Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, Chromium must be restarted for the changes to take effect. https://access.redhat.com/errata/RHSA-2018:3803

Failure to dismiss http auth dialogs on navigation in Network Authentication in Google Chrome on Android prior to 71.0.3578.80 allowed a remote attacker to confuse the user about the origin of an auto dialog via a crafted HTML page.

Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, Chromium must be restarted for the changes to take effect. https://access.redhat.com/errata/RHSA-2018:3803

Insufficient validate of external protocols in Shell Integration in Google Chrome on Windows prior to 71.0.3578.80 allowed a remote attacker to launch external programs via a crafted HTML page.

Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, Chromium must be restarted for the changes to take effect. https://access.redhat.com/errata/RHSA-2018:3803

Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.

Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, Chromium must be restarted for the changes to take effect. https://access.redhat.com/errata/RHSA-2018:3803

An integer overflow in path handling lead to a use after free in Skia in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

CWE-416 - Use After Free
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, Chromium must be restarted for the changes to take effect. https://access.redhat.com/errata/RHSA-2018:3803

Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.

Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, Chromium must be restarted for the changes to take effect. https://access.redhat.com/errata/RHSA-2018:3803

Lack of special casing of localhost in WPAD files in Google Chrome prior to 71.0.3578.80 allowed an attacker on the local network segment to proxy resources on localhost via a crafted WPAD file.

Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, Chromium must be restarted for the changes to take effect. https://access.redhat.com/errata/RHSA-2018:3803

Incorrect handling of Reflect.construct in V8 in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.

Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, Chromium must be restarted for the changes to take effect. https://access.redhat.com/errata/RHSA-2018:3803
References
https://access.redhat.com/errata/RHSA-2018:3803 self
https://access.redhat.com/security/updates/classi… external
https://bugzilla.redhat.com/show_bug.cgi?id=1656547 external
https://bugzilla.redhat.com/show_bug.cgi?id=1656548 external
https://bugzilla.redhat.com/show_bug.cgi?id=1656549 external
https://bugzilla.redhat.com/show_bug.cgi?id=1656550 external
https://bugzilla.redhat.com/show_bug.cgi?id=1656551 external
https://bugzilla.redhat.com/show_bug.cgi?id=1656552 external
https://bugzilla.redhat.com/show_bug.cgi?id=1656553 external
https://bugzilla.redhat.com/show_bug.cgi?id=1656554 external
https://bugzilla.redhat.com/show_bug.cgi?id=1656555 external
https://bugzilla.redhat.com/show_bug.cgi?id=1656556 external
https://bugzilla.redhat.com/show_bug.cgi?id=1656557 external
https://bugzilla.redhat.com/show_bug.cgi?id=1656558 external
https://bugzilla.redhat.com/show_bug.cgi?id=1656559 external
https://bugzilla.redhat.com/show_bug.cgi?id=1656560 external
https://bugzilla.redhat.com/show_bug.cgi?id=1656561 external
https://bugzilla.redhat.com/show_bug.cgi?id=1656562 external
https://bugzilla.redhat.com/show_bug.cgi?id=1656563 external
https://bugzilla.redhat.com/show_bug.cgi?id=1656564 external
https://bugzilla.redhat.com/show_bug.cgi?id=1656565 external
https://bugzilla.redhat.com/show_bug.cgi?id=1656566 external
https://bugzilla.redhat.com/show_bug.cgi?id=1656567 external
https://bugzilla.redhat.com/show_bug.cgi?id=1656568 external
https://bugzilla.redhat.com/show_bug.cgi?id=1656569 external
https://bugzilla.redhat.com/show_bug.cgi?id=1656570 external
https://bugzilla.redhat.com/show_bug.cgi?id=1656571 external
https://bugzilla.redhat.com/show_bug.cgi?id=1656572 external
https://bugzilla.redhat.com/show_bug.cgi?id=1656573 external
https://security.access.redhat.com/data/csaf/v2/a… self
https://access.redhat.com/security/cve/CVE-2018-17480 self
https://bugzilla.redhat.com/show_bug.cgi?id=1656547 external
https://www.cve.org/CVERecord?id=CVE-2018-17480 external
https://nvd.nist.gov/vuln/detail/CVE-2018-17480 external
https://chromereleases.googleblog.com/2018/12/sta… external
https://www.cisa.gov/known-exploited-vulnerabilit… external
https://access.redhat.com/security/cve/CVE-2018-17481 self
https://bugzilla.redhat.com/show_bug.cgi?id=1656548 external
https://www.cve.org/CVERecord?id=CVE-2018-17481 external
https://nvd.nist.gov/vuln/detail/CVE-2018-17481 external
https://access.redhat.com/security/cve/CVE-2018-18335 self
https://bugzilla.redhat.com/show_bug.cgi?id=1656549 external
https://www.cve.org/CVERecord?id=CVE-2018-18335 external
https://nvd.nist.gov/vuln/detail/CVE-2018-18335 external
https://access.redhat.com/security/cve/CVE-2018-18336 self
https://bugzilla.redhat.com/show_bug.cgi?id=1656550 external
https://www.cve.org/CVERecord?id=CVE-2018-18336 external
https://nvd.nist.gov/vuln/detail/CVE-2018-18336 external
https://access.redhat.com/security/cve/CVE-2018-18337 self
https://bugzilla.redhat.com/show_bug.cgi?id=1656551 external
https://www.cve.org/CVERecord?id=CVE-2018-18337 external
https://nvd.nist.gov/vuln/detail/CVE-2018-18337 external
https://access.redhat.com/security/cve/CVE-2018-18338 self
https://bugzilla.redhat.com/show_bug.cgi?id=1656552 external
https://www.cve.org/CVERecord?id=CVE-2018-18338 external
https://nvd.nist.gov/vuln/detail/CVE-2018-18338 external
https://access.redhat.com/security/cve/CVE-2018-18339 self
https://bugzilla.redhat.com/show_bug.cgi?id=1656553 external
https://www.cve.org/CVERecord?id=CVE-2018-18339 external
https://nvd.nist.gov/vuln/detail/CVE-2018-18339 external
https://access.redhat.com/security/cve/CVE-2018-18340 self
https://bugzilla.redhat.com/show_bug.cgi?id=1656554 external
https://www.cve.org/CVERecord?id=CVE-2018-18340 external
https://nvd.nist.gov/vuln/detail/CVE-2018-18340 external
https://access.redhat.com/security/cve/CVE-2018-18341 self
https://bugzilla.redhat.com/show_bug.cgi?id=1656555 external
https://www.cve.org/CVERecord?id=CVE-2018-18341 external
https://nvd.nist.gov/vuln/detail/CVE-2018-18341 external
https://access.redhat.com/security/cve/CVE-2018-18342 self
https://bugzilla.redhat.com/show_bug.cgi?id=1656556 external
https://www.cve.org/CVERecord?id=CVE-2018-18342 external
https://nvd.nist.gov/vuln/detail/CVE-2018-18342 external
https://access.redhat.com/security/cve/CVE-2018-18343 self
https://bugzilla.redhat.com/show_bug.cgi?id=1656557 external
https://www.cve.org/CVERecord?id=CVE-2018-18343 external
https://nvd.nist.gov/vuln/detail/CVE-2018-18343 external
https://access.redhat.com/security/cve/CVE-2018-18344 self
https://bugzilla.redhat.com/show_bug.cgi?id=1656558 external
https://www.cve.org/CVERecord?id=CVE-2018-18344 external
https://nvd.nist.gov/vuln/detail/CVE-2018-18344 external
https://access.redhat.com/security/cve/CVE-2018-18345 self
https://bugzilla.redhat.com/show_bug.cgi?id=1656559 external
https://www.cve.org/CVERecord?id=CVE-2018-18345 external
https://nvd.nist.gov/vuln/detail/CVE-2018-18345 external
https://access.redhat.com/security/cve/CVE-2018-18346 self
https://bugzilla.redhat.com/show_bug.cgi?id=1656560 external
https://www.cve.org/CVERecord?id=CVE-2018-18346 external
https://nvd.nist.gov/vuln/detail/CVE-2018-18346 external
https://access.redhat.com/security/cve/CVE-2018-18347 self
https://bugzilla.redhat.com/show_bug.cgi?id=1656561 external
https://www.cve.org/CVERecord?id=CVE-2018-18347 external
https://nvd.nist.gov/vuln/detail/CVE-2018-18347 external
https://access.redhat.com/security/cve/CVE-2018-18348 self
https://bugzilla.redhat.com/show_bug.cgi?id=1656562 external
https://www.cve.org/CVERecord?id=CVE-2018-18348 external
https://nvd.nist.gov/vuln/detail/CVE-2018-18348 external
https://access.redhat.com/security/cve/CVE-2018-18349 self
https://bugzilla.redhat.com/show_bug.cgi?id=1656563 external
https://www.cve.org/CVERecord?id=CVE-2018-18349 external
https://nvd.nist.gov/vuln/detail/CVE-2018-18349 external
https://access.redhat.com/security/cve/CVE-2018-18350 self
https://bugzilla.redhat.com/show_bug.cgi?id=1656564 external
https://www.cve.org/CVERecord?id=CVE-2018-18350 external
https://nvd.nist.gov/vuln/detail/CVE-2018-18350 external
https://access.redhat.com/security/cve/CVE-2018-18351 self
https://bugzilla.redhat.com/show_bug.cgi?id=1656565 external
https://www.cve.org/CVERecord?id=CVE-2018-18351 external
https://nvd.nist.gov/vuln/detail/CVE-2018-18351 external
https://access.redhat.com/security/cve/CVE-2018-18352 self
https://bugzilla.redhat.com/show_bug.cgi?id=1656566 external
https://www.cve.org/CVERecord?id=CVE-2018-18352 external
https://nvd.nist.gov/vuln/detail/CVE-2018-18352 external
https://access.redhat.com/security/cve/CVE-2018-18353 self
https://bugzilla.redhat.com/show_bug.cgi?id=1656567 external
https://www.cve.org/CVERecord?id=CVE-2018-18353 external
https://nvd.nist.gov/vuln/detail/CVE-2018-18353 external
https://access.redhat.com/security/cve/CVE-2018-18354 self
https://bugzilla.redhat.com/show_bug.cgi?id=1656568 external
https://www.cve.org/CVERecord?id=CVE-2018-18354 external
https://nvd.nist.gov/vuln/detail/CVE-2018-18354 external
https://access.redhat.com/security/cve/CVE-2018-18355 self
https://bugzilla.redhat.com/show_bug.cgi?id=1656569 external
https://www.cve.org/CVERecord?id=CVE-2018-18355 external
https://nvd.nist.gov/vuln/detail/CVE-2018-18355 external
https://access.redhat.com/security/cve/CVE-2018-18356 self
https://bugzilla.redhat.com/show_bug.cgi?id=1656570 external
https://www.cve.org/CVERecord?id=CVE-2018-18356 external
https://nvd.nist.gov/vuln/detail/CVE-2018-18356 external
https://www.mozilla.org/en-US/security/advisories… external
https://www.mozilla.org/en-US/security/advisories… external
https://www.mozilla.org/en-US/security/advisories… external
https://access.redhat.com/security/cve/CVE-2018-18357 self
https://bugzilla.redhat.com/show_bug.cgi?id=1656571 external
https://www.cve.org/CVERecord?id=CVE-2018-18357 external
https://nvd.nist.gov/vuln/detail/CVE-2018-18357 external
https://access.redhat.com/security/cve/CVE-2018-18358 self
https://bugzilla.redhat.com/show_bug.cgi?id=1656572 external
https://www.cve.org/CVERecord?id=CVE-2018-18358 external
https://nvd.nist.gov/vuln/detail/CVE-2018-18358 external
https://access.redhat.com/security/cve/CVE-2018-18359 self
https://bugzilla.redhat.com/show_bug.cgi?id=1656573 external
https://www.cve.org/CVERecord?id=CVE-2018-18359 external
https://nvd.nist.gov/vuln/detail/CVE-2018-18359 external

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for chromium-browser is now available for Red Hat Enterprise Linux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Chromium is an open-source web browser, powered by WebKit (Blink).\n\nThis update upgrades Chromium to version 71.0.3578.80.\n\nSecurity Fix(es):\n\n* chromium-browser: Out of bounds write in V8 (CVE-2018-17480)\n\n* chromium-browser: Use after frees in PDFium (CVE-2018-17481)\n\n* chromium-browser: Heap buffer overflow in Skia (CVE-2018-18335)\n\n* chromium-browser: Use after free in PDFium (CVE-2018-18336)\n\n* chromium-browser: Use after free in Blink (CVE-2018-18337)\n\n* chromium-browser: Heap buffer overflow in Canvas (CVE-2018-18338)\n\n* chromium-browser: Use after free in WebAudio (CVE-2018-18339)\n\n* chromium-browser: Use after free in MediaRecorder (CVE-2018-18340)\n\n* chromium-browser: Heap buffer overflow in Blink (CVE-2018-18341)\n\n* chromium-browser: Out of bounds write in V8 (CVE-2018-18342)\n\n* chromium-browser: Use after free in Skia (CVE-2018-18343)\n\n* chromium-browser: Inappropriate implementation in Extensions (CVE-2018-18344)\n\n* chromium-browser: Inappropriate implementation in Site Isolation (CVE-2018-18345)\n\n* chromium-browser: Incorrect security UI in Blink (CVE-2018-18346)\n\n* chromium-browser: Inappropriate implementation in Navigation (CVE-2018-18347)\n\n* chromium-browser: Inappropriate implementation in Omnibox (CVE-2018-18348)\n\n* chromium-browser: Insufficient policy enforcement in Blink (CVE-2018-18349)\n\n* chromium-browser: Insufficient policy enforcement in Blink (CVE-2018-18350)\n\n* chromium-browser: Insufficient policy enforcement in Navigation (CVE-2018-18351)\n\n* chromium-browser: Inappropriate implementation in Media (CVE-2018-18352)\n\n* chromium-browser: Inappropriate implementation in Network Authentication (CVE-2018-18353)\n\n* chromium-browser: Insufficient data validation in Shell Integration (CVE-2018-18354)\n\n* chromium-browser: Insufficient policy enforcement in URL Formatter (CVE-2018-18355)\n\n* chromium-browser: Use after free in Skia (CVE-2018-18356)\n\n* chromium-browser: Insufficient policy enforcement in URL Formatter (CVE-2018-18357)\n\n* chromium-browser: Insufficient policy enforcement in Proxy (CVE-2018-18358)\n\n* chromium-browser: Out of bounds read in V8 (CVE-2018-18359)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2018:3803",
        "url": "https://access.redhat.com/errata/RHSA-2018:3803"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1656547",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656547"
      },
      {
        "category": "external",
        "summary": "1656548",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656548"
      },
      {
        "category": "external",
        "summary": "1656549",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656549"
      },
      {
        "category": "external",
        "summary": "1656550",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656550"
      },
      {
        "category": "external",
        "summary": "1656551",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656551"
      },
      {
        "category": "external",
        "summary": "1656552",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656552"
      },
      {
        "category": "external",
        "summary": "1656553",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656553"
      },
      {
        "category": "external",
        "summary": "1656554",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656554"
      },
      {
        "category": "external",
        "summary": "1656555",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656555"
      },
      {
        "category": "external",
        "summary": "1656556",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656556"
      },
      {
        "category": "external",
        "summary": "1656557",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656557"
      },
      {
        "category": "external",
        "summary": "1656558",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656558"
      },
      {
        "category": "external",
        "summary": "1656559",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656559"
      },
      {
        "category": "external",
        "summary": "1656560",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656560"
      },
      {
        "category": "external",
        "summary": "1656561",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656561"
      },
      {
        "category": "external",
        "summary": "1656562",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656562"
      },
      {
        "category": "external",
        "summary": "1656563",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656563"
      },
      {
        "category": "external",
        "summary": "1656564",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656564"
      },
      {
        "category": "external",
        "summary": "1656565",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656565"
      },
      {
        "category": "external",
        "summary": "1656566",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656566"
      },
      {
        "category": "external",
        "summary": "1656567",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656567"
      },
      {
        "category": "external",
        "summary": "1656568",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656568"
      },
      {
        "category": "external",
        "summary": "1656569",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656569"
      },
      {
        "category": "external",
        "summary": "1656570",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656570"
      },
      {
        "category": "external",
        "summary": "1656571",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656571"
      },
      {
        "category": "external",
        "summary": "1656572",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656572"
      },
      {
        "category": "external",
        "summary": "1656573",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656573"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_3803.json"
      }
    ],
    "title": "Red Hat Security Advisory: chromium-browser security update",
    "tracking": {
      "current_release_date": "2024-11-15T00:38:12+00:00",
      "generator": {
        "date": "2024-11-15T00:38:12+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2018:3803",
      "initial_release_date": "2018-12-10T10:34:01+00:00",
      "revision_history": [
        {
          "date": "2018-12-10T10:34:01+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2018-12-10T10:34:01+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-15T00:38:12+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
                  "product_id": "6Client-Supplementary-6.10.z",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_extras:6"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)",
                  "product_id": "6Server-Supplementary-6.10.z",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_extras:6"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
                  "product_id": "6Workstation-Supplementary-6.10.z",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_extras:6"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux Supplementary"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
                "product": {
                  "name": "chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
                  "product_id": "chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/chromium-browser-debuginfo@71.0.3578.80-1.el6_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
                "product": {
                  "name": "chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
                  "product_id": "chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/chromium-browser@71.0.3578.80-1.el6_10?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
                "product": {
                  "name": "chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
                  "product_id": "chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/chromium-browser-debuginfo@71.0.3578.80-1.el6_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "chromium-browser-0:71.0.3578.80-1.el6_10.i686",
                "product": {
                  "name": "chromium-browser-0:71.0.3578.80-1.el6_10.i686",
                  "product_id": "chromium-browser-0:71.0.3578.80-1.el6_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/chromium-browser@71.0.3578.80-1.el6_10?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "chromium-browser-0:71.0.3578.80-1.el6_10.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
          "product_id": "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686"
        },
        "product_reference": "chromium-browser-0:71.0.3578.80-1.el6_10.i686",
        "relates_to_product_reference": "6Client-Supplementary-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "chromium-browser-0:71.0.3578.80-1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
          "product_id": "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64"
        },
        "product_reference": "chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
        "relates_to_product_reference": "6Client-Supplementary-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
          "product_id": "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686"
        },
        "product_reference": "chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
        "relates_to_product_reference": "6Client-Supplementary-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
          "product_id": "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
        },
        "product_reference": "chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
        "relates_to_product_reference": "6Client-Supplementary-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "chromium-browser-0:71.0.3578.80-1.el6_10.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
          "product_id": "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686"
        },
        "product_reference": "chromium-browser-0:71.0.3578.80-1.el6_10.i686",
        "relates_to_product_reference": "6Server-Supplementary-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "chromium-browser-0:71.0.3578.80-1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
          "product_id": "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64"
        },
        "product_reference": "chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
        "relates_to_product_reference": "6Server-Supplementary-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
          "product_id": "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686"
        },
        "product_reference": "chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
        "relates_to_product_reference": "6Server-Supplementary-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
          "product_id": "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
        },
        "product_reference": "chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
        "relates_to_product_reference": "6Server-Supplementary-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "chromium-browser-0:71.0.3578.80-1.el6_10.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
          "product_id": "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686"
        },
        "product_reference": "chromium-browser-0:71.0.3578.80-1.el6_10.i686",
        "relates_to_product_reference": "6Workstation-Supplementary-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "chromium-browser-0:71.0.3578.80-1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
          "product_id": "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64"
        },
        "product_reference": "chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
        "relates_to_product_reference": "6Workstation-Supplementary-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
          "product_id": "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686"
        },
        "product_reference": "chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
        "relates_to_product_reference": "6Workstation-Supplementary-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
          "product_id": "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
        },
        "product_reference": "chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
        "relates_to_product_reference": "6Workstation-Supplementary-6.10.z"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2018-17480",
      "discovery_date": "2018-12-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1656547"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Execution of user supplied Javascript during array deserialization leading to an out of bounds write in V8 in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "chromium-browser: Out of bounds write in V8",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
          "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
          "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2018-17480"
        },
        {
          "category": "external",
          "summary": "RHBZ#1656547",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656547"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2018-17480",
          "url": "https://www.cve.org/CVERecord?id=CVE-2018-17480"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-17480",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-17480"
        },
        {
          "category": "external",
          "summary": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html",
          "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2018-12-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2018-12-10T10:34:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.",
          "product_ids": [
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2018:3803"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2022-06-08T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "chromium-browser: Out of bounds write in V8"
    },
    {
      "cve": "CVE-2018-17481",
      "discovery_date": "2018-12-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1656548"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Incorrect object lifecycle handling in PDFium in Google Chrome prior to 71.0.3578.98 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "chromium-browser: Use after frees in PDFium",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
          "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
          "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2018-17481"
        },
        {
          "category": "external",
          "summary": "RHBZ#1656548",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656548"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2018-17481",
          "url": "https://www.cve.org/CVERecord?id=CVE-2018-17481"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-17481",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-17481"
        },
        {
          "category": "external",
          "summary": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html",
          "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html"
        }
      ],
      "release_date": "2018-12-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2018-12-10T10:34:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.",
          "product_ids": [
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2018:3803"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "chromium-browser: Use after frees in PDFium"
    },
    {
      "cve": "CVE-2018-18335",
      "discovery_date": "2018-12-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1656549"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Heap buffer overflow in Skia in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "chromium-browser: Heap buffer overflow in Skia",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
          "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
          "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2018-18335"
        },
        {
          "category": "external",
          "summary": "RHBZ#1656549",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656549"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2018-18335",
          "url": "https://www.cve.org/CVERecord?id=CVE-2018-18335"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-18335",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-18335"
        },
        {
          "category": "external",
          "summary": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html",
          "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html"
        }
      ],
      "release_date": "2018-12-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2018-12-10T10:34:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.",
          "product_ids": [
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2018:3803"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "chromium-browser: Heap buffer overflow in Skia"
    },
    {
      "cve": "CVE-2018-18336",
      "discovery_date": "2018-12-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1656550"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Incorrect object lifecycle in PDFium in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "chromium-browser: Use after free in PDFium",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
          "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
          "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2018-18336"
        },
        {
          "category": "external",
          "summary": "RHBZ#1656550",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656550"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2018-18336",
          "url": "https://www.cve.org/CVERecord?id=CVE-2018-18336"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-18336",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-18336"
        },
        {
          "category": "external",
          "summary": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html",
          "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html"
        }
      ],
      "release_date": "2018-12-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2018-12-10T10:34:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.",
          "product_ids": [
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2018:3803"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "chromium-browser: Use after free in PDFium"
    },
    {
      "cve": "CVE-2018-18337",
      "discovery_date": "2018-12-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1656551"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Incorrect handling of stylesheets leading to a use after free in Blink in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "chromium-browser: Use after free in Blink",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
          "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
          "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2018-18337"
        },
        {
          "category": "external",
          "summary": "RHBZ#1656551",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656551"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2018-18337",
          "url": "https://www.cve.org/CVERecord?id=CVE-2018-18337"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-18337",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-18337"
        },
        {
          "category": "external",
          "summary": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html",
          "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html"
        }
      ],
      "release_date": "2018-12-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2018-12-10T10:34:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.",
          "product_ids": [
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2018:3803"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "chromium-browser: Use after free in Blink"
    },
    {
      "cve": "CVE-2018-18338",
      "discovery_date": "2018-12-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1656552"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Incorrect, thread-unsafe use of SkImage in Canvas in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "chromium-browser: Heap buffer overflow in Canvas",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
          "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
          "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2018-18338"
        },
        {
          "category": "external",
          "summary": "RHBZ#1656552",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656552"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2018-18338",
          "url": "https://www.cve.org/CVERecord?id=CVE-2018-18338"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-18338",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-18338"
        },
        {
          "category": "external",
          "summary": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html",
          "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html"
        }
      ],
      "release_date": "2018-12-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2018-12-10T10:34:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.",
          "product_ids": [
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2018:3803"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "chromium-browser: Heap buffer overflow in Canvas"
    },
    {
      "cve": "CVE-2018-18339",
      "discovery_date": "2018-12-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1656553"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Incorrect object lifecycle in WebAudio in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "chromium-browser: Use after free in WebAudio",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
          "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
          "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2018-18339"
        },
        {
          "category": "external",
          "summary": "RHBZ#1656553",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656553"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2018-18339",
          "url": "https://www.cve.org/CVERecord?id=CVE-2018-18339"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-18339",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-18339"
        },
        {
          "category": "external",
          "summary": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html",
          "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html"
        }
      ],
      "release_date": "2018-12-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2018-12-10T10:34:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.",
          "product_ids": [
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2018:3803"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "chromium-browser: Use after free in WebAudio"
    },
    {
      "cve": "CVE-2018-18340",
      "discovery_date": "2018-12-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1656554"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Incorrect object lifecycle in MediaRecorder in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "chromium-browser: Use after free in MediaRecorder",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
          "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
          "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2018-18340"
        },
        {
          "category": "external",
          "summary": "RHBZ#1656554",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656554"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2018-18340",
          "url": "https://www.cve.org/CVERecord?id=CVE-2018-18340"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-18340",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-18340"
        },
        {
          "category": "external",
          "summary": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html",
          "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html"
        }
      ],
      "release_date": "2018-12-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2018-12-10T10:34:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.",
          "product_ids": [
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2018:3803"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "chromium-browser: Use after free in MediaRecorder"
    },
    {
      "cve": "CVE-2018-18341",
      "discovery_date": "2018-12-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1656555"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An integer overflow leading to a heap buffer overflow in Blink in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "chromium-browser: Heap buffer overflow in Blink",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
          "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
          "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2018-18341"
        },
        {
          "category": "external",
          "summary": "RHBZ#1656555",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656555"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2018-18341",
          "url": "https://www.cve.org/CVERecord?id=CVE-2018-18341"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-18341",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-18341"
        },
        {
          "category": "external",
          "summary": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html",
          "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html"
        }
      ],
      "release_date": "2018-12-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2018-12-10T10:34:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.",
          "product_ids": [
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2018:3803"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "chromium-browser: Heap buffer overflow in Blink"
    },
    {
      "cve": "CVE-2018-18342",
      "discovery_date": "2018-12-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1656556"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Execution of user supplied Javascript during object deserialization can update object length leading to an out of bounds write in V8 in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "chromium-browser: Out of bounds write in V8",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
          "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
          "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2018-18342"
        },
        {
          "category": "external",
          "summary": "RHBZ#1656556",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656556"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2018-18342",
          "url": "https://www.cve.org/CVERecord?id=CVE-2018-18342"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-18342",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-18342"
        },
        {
          "category": "external",
          "summary": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html",
          "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html"
        }
      ],
      "release_date": "2018-12-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2018-12-10T10:34:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.",
          "product_ids": [
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2018:3803"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "chromium-browser: Out of bounds write in V8"
    },
    {
      "cve": "CVE-2018-18343",
      "discovery_date": "2018-12-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1656557"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Incorrect handing of paths leading to a use after free in Skia in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "chromium-browser: Use after free in Skia",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
          "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
          "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2018-18343"
        },
        {
          "category": "external",
          "summary": "RHBZ#1656557",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656557"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2018-18343",
          "url": "https://www.cve.org/CVERecord?id=CVE-2018-18343"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-18343",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-18343"
        },
        {
          "category": "external",
          "summary": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html",
          "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html"
        }
      ],
      "release_date": "2018-12-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2018-12-10T10:34:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.",
          "product_ids": [
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2018:3803"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "chromium-browser: Use after free in Skia"
    },
    {
      "cve": "CVE-2018-18344",
      "discovery_date": "2018-12-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1656558"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Inappropriate allowance of the setDownloadBehavior devtools protocol feature in Extensions in Google Chrome prior to 71.0.3578.80 allowed a remote attacker with control of an installed extension to access files on the local file system via a crafted Chrome Extension.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "chromium-browser: Inappropriate implementation in Extensions",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
          "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
          "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2018-18344"
        },
        {
          "category": "external",
          "summary": "RHBZ#1656558",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656558"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2018-18344",
          "url": "https://www.cve.org/CVERecord?id=CVE-2018-18344"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-18344",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-18344"
        },
        {
          "category": "external",
          "summary": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html",
          "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html"
        }
      ],
      "release_date": "2018-12-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2018-12-10T10:34:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.",
          "product_ids": [
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2018:3803"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "chromium-browser: Inappropriate implementation in Extensions"
    },
    {
      "cve": "CVE-2018-18345",
      "discovery_date": "2018-12-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1656559"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Incorrect handling of blob URLS in Site Isolation in Google Chrome prior to 71.0.3578.80 allowed a remote attacker who had compromised the renderer process to bypass site isolation protections via a crafted HTML page.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "chromium-browser: Inappropriate implementation in Site Isolation",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
          "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
          "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2018-18345"
        },
        {
          "category": "external",
          "summary": "RHBZ#1656559",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656559"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2018-18345",
          "url": "https://www.cve.org/CVERecord?id=CVE-2018-18345"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-18345",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-18345"
        },
        {
          "category": "external",
          "summary": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html",
          "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html"
        }
      ],
      "release_date": "2018-12-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2018-12-10T10:34:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.",
          "product_ids": [
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2018:3803"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "chromium-browser: Inappropriate implementation in Site Isolation"
    },
    {
      "cve": "CVE-2018-18346",
      "discovery_date": "2018-12-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1656560"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Incorrect handling of alert box display in Blink in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to present confusing browser UI via a crafted HTML page.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "chromium-browser: Incorrect security UI in Blink",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
          "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
          "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2018-18346"
        },
        {
          "category": "external",
          "summary": "RHBZ#1656560",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656560"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2018-18346",
          "url": "https://www.cve.org/CVERecord?id=CVE-2018-18346"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-18346",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-18346"
        },
        {
          "category": "external",
          "summary": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html",
          "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html"
        }
      ],
      "release_date": "2018-12-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2018-12-10T10:34:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.",
          "product_ids": [
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2018:3803"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "chromium-browser: Incorrect security UI in Blink"
    },
    {
      "cve": "CVE-2018-18347",
      "discovery_date": "2018-12-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1656561"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Incorrect handling of failed navigations with invalid URLs in Navigation in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to trick a user into executing javascript in an arbitrary origin via a crafted HTML page.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "chromium-browser: Inappropriate implementation in Navigation",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
          "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
          "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2018-18347"
        },
        {
          "category": "external",
          "summary": "RHBZ#1656561",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656561"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2018-18347",
          "url": "https://www.cve.org/CVERecord?id=CVE-2018-18347"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-18347",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-18347"
        },
        {
          "category": "external",
          "summary": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html",
          "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html"
        }
      ],
      "release_date": "2018-12-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2018-12-10T10:34:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.",
          "product_ids": [
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2018:3803"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "chromium-browser: Inappropriate implementation in Navigation"
    },
    {
      "cve": "CVE-2018-18348",
      "discovery_date": "2018-12-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1656562"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Incorrect handling of bidirectional domain names with RTL characters in Omnibox in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "chromium-browser: Inappropriate implementation in Omnibox",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
          "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
          "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2018-18348"
        },
        {
          "category": "external",
          "summary": "RHBZ#1656562",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656562"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2018-18348",
          "url": "https://www.cve.org/CVERecord?id=CVE-2018-18348"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-18348",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-18348"
        },
        {
          "category": "external",
          "summary": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html",
          "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html"
        }
      ],
      "release_date": "2018-12-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2018-12-10T10:34:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.",
          "product_ids": [
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2018:3803"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "chromium-browser: Inappropriate implementation in Omnibox"
    },
    {
      "cve": "CVE-2018-18349",
      "discovery_date": "2018-12-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1656563"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Remote frame navigations was incorrectly permitted to local resources in Blink in Google Chrome prior to 71.0.3578.80 allowed an attacker who convinced a user to install a malicious extension to access files on the local file system via a crafted Chrome Extension.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "chromium-browser: Insufficient policy enforcement in Blink",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
          "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
          "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2018-18349"
        },
        {
          "category": "external",
          "summary": "RHBZ#1656563",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656563"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2018-18349",
          "url": "https://www.cve.org/CVERecord?id=CVE-2018-18349"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-18349",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-18349"
        },
        {
          "category": "external",
          "summary": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html",
          "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html"
        }
      ],
      "release_date": "2018-12-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2018-12-10T10:34:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.",
          "product_ids": [
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2018:3803"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "chromium-browser: Insufficient policy enforcement in Blink"
    },
    {
      "cve": "CVE-2018-18350",
      "discovery_date": "2018-12-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1656564"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Incorrect handling of CSP enforcement during navigations in Blink in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to bypass content security policy via a crafted HTML page.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "chromium-browser: Insufficient policy enforcement in Blink",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
          "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
          "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2018-18350"
        },
        {
          "category": "external",
          "summary": "RHBZ#1656564",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656564"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2018-18350",
          "url": "https://www.cve.org/CVERecord?id=CVE-2018-18350"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-18350",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-18350"
        },
        {
          "category": "external",
          "summary": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html",
          "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html"
        }
      ],
      "release_date": "2018-12-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2018-12-10T10:34:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.",
          "product_ids": [
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2018:3803"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "chromium-browser: Insufficient policy enforcement in Blink"
    },
    {
      "cve": "CVE-2018-18351",
      "discovery_date": "2018-12-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1656565"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Lack of proper validation of ancestor frames site when sending lax cookies in Navigation in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to bypass SameSite cookie policy via a crafted HTML page.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "chromium-browser: Insufficient policy enforcement in Navigation",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
          "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
          "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2018-18351"
        },
        {
          "category": "external",
          "summary": "RHBZ#1656565",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656565"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2018-18351",
          "url": "https://www.cve.org/CVERecord?id=CVE-2018-18351"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-18351",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-18351"
        },
        {
          "category": "external",
          "summary": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html",
          "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html"
        }
      ],
      "release_date": "2018-12-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2018-12-10T10:34:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.",
          "product_ids": [
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2018:3803"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "chromium-browser: Insufficient policy enforcement in Navigation"
    },
    {
      "cve": "CVE-2018-18352",
      "discovery_date": "2018-12-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1656566"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Service works could inappropriately gain access to cross origin audio in Media in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to bypass same origin policy for audio content via a crafted HTML page.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "chromium-browser: Inappropriate implementation in Media",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
          "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
          "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2018-18352"
        },
        {
          "category": "external",
          "summary": "RHBZ#1656566",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656566"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2018-18352",
          "url": "https://www.cve.org/CVERecord?id=CVE-2018-18352"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-18352",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-18352"
        },
        {
          "category": "external",
          "summary": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html",
          "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html"
        }
      ],
      "release_date": "2018-12-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2018-12-10T10:34:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.",
          "product_ids": [
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2018:3803"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "chromium-browser: Inappropriate implementation in Media"
    },
    {
      "cve": "CVE-2018-18353",
      "discovery_date": "2018-12-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1656567"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Failure to dismiss http auth dialogs on navigation in Network Authentication in Google Chrome on Android prior to 71.0.3578.80 allowed a remote attacker to confuse the user about the origin of an auto dialog via a crafted HTML page.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "chromium-browser: Inappropriate implementation in Network Authentication",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
          "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
          "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2018-18353"
        },
        {
          "category": "external",
          "summary": "RHBZ#1656567",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656567"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2018-18353",
          "url": "https://www.cve.org/CVERecord?id=CVE-2018-18353"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-18353",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-18353"
        },
        {
          "category": "external",
          "summary": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html",
          "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html"
        }
      ],
      "release_date": "2018-12-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2018-12-10T10:34:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.",
          "product_ids": [
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2018:3803"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "chromium-browser: Inappropriate implementation in Network Authentication"
    },
    {
      "cve": "CVE-2018-18354",
      "discovery_date": "2018-12-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1656568"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Insufficient validate of external protocols in Shell Integration in Google Chrome on Windows prior to 71.0.3578.80 allowed a remote attacker to launch external programs via a crafted HTML page.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "chromium-browser: Insufficient data validation in Shell Integration",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
          "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
          "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2018-18354"
        },
        {
          "category": "external",
          "summary": "RHBZ#1656568",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656568"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2018-18354",
          "url": "https://www.cve.org/CVERecord?id=CVE-2018-18354"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-18354",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-18354"
        },
        {
          "category": "external",
          "summary": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html",
          "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html"
        }
      ],
      "release_date": "2018-12-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2018-12-10T10:34:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.",
          "product_ids": [
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2018:3803"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "chromium-browser: Insufficient data validation in Shell Integration"
    },
    {
      "cve": "CVE-2018-18355",
      "discovery_date": "2018-12-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1656569"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "chromium-browser: Insufficient policy enforcement in URL Formatter",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
          "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
          "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2018-18355"
        },
        {
          "category": "external",
          "summary": "RHBZ#1656569",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656569"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2018-18355",
          "url": "https://www.cve.org/CVERecord?id=CVE-2018-18355"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-18355",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-18355"
        },
        {
          "category": "external",
          "summary": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html",
          "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html"
        }
      ],
      "release_date": "2018-12-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2018-12-10T10:34:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.",
          "product_ids": [
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2018:3803"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "chromium-browser: Insufficient policy enforcement in URL Formatter"
    },
    {
      "cve": "CVE-2018-18356",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2018-12-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1656570"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An integer overflow in path handling lead to a use after free in Skia in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mozilla: Use after free in Skia",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
          "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
          "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2018-18356"
        },
        {
          "category": "external",
          "summary": "RHBZ#1656570",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656570"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2018-18356",
          "url": "https://www.cve.org/CVERecord?id=CVE-2018-18356"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-18356",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-18356"
        },
        {
          "category": "external",
          "summary": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html",
          "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-04/#CVE-2018-18356",
          "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-04/#CVE-2018-18356"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-05/#CVE-2018-18356",
          "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-05/#CVE-2018-18356"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-06/#CVE-2018-18356",
          "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-06/#CVE-2018-18356"
        }
      ],
      "release_date": "2018-12-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2018-12-10T10:34:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.",
          "product_ids": [
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2018:3803"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "mozilla: Use after free in Skia"
    },
    {
      "cve": "CVE-2018-18357",
      "discovery_date": "2018-12-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1656571"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "chromium-browser: Insufficient policy enforcement in URL Formatter",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
          "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
          "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2018-18357"
        },
        {
          "category": "external",
          "summary": "RHBZ#1656571",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656571"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2018-18357",
          "url": "https://www.cve.org/CVERecord?id=CVE-2018-18357"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-18357",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-18357"
        },
        {
          "category": "external",
          "summary": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html",
          "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html"
        }
      ],
      "release_date": "2018-12-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2018-12-10T10:34:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.",
          "product_ids": [
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2018:3803"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "chromium-browser: Insufficient policy enforcement in URL Formatter"
    },
    {
      "cve": "CVE-2018-18358",
      "discovery_date": "2018-12-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1656572"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Lack of special casing of localhost in WPAD files in Google Chrome prior to 71.0.3578.80 allowed an attacker on the local network segment to proxy resources on localhost via a crafted WPAD file.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "chromium-browser: Insufficient policy enforcement in Proxy",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
          "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
          "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2018-18358"
        },
        {
          "category": "external",
          "summary": "RHBZ#1656572",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656572"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2018-18358",
          "url": "https://www.cve.org/CVERecord?id=CVE-2018-18358"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-18358",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-18358"
        },
        {
          "category": "external",
          "summary": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html",
          "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html"
        }
      ],
      "release_date": "2018-12-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2018-12-10T10:34:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.",
          "product_ids": [
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2018:3803"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "chromium-browser: Insufficient policy enforcement in Proxy"
    },
    {
      "cve": "CVE-2018-18359",
      "discovery_date": "2018-12-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1656573"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Incorrect handling of Reflect.construct in V8 in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "chromium-browser: Out of bounds read in V8",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
          "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
          "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
          "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
          "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
          "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2018-18359"
        },
        {
          "category": "external",
          "summary": "RHBZ#1656573",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656573"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2018-18359",
          "url": "https://www.cve.org/CVERecord?id=CVE-2018-18359"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-18359",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-18359"
        },
        {
          "category": "external",
          "summary": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html",
          "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html"
        }
      ],
      "release_date": "2018-12-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2018-12-10T10:34:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.",
          "product_ids": [
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2018:3803"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-0:71.0.3578.80-1.el6_10.x86_64",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.i686",
            "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:71.0.3578.80-1.el6_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "chromium-browser: Out of bounds read in V8"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…