Action not permitted
Modal body text goes here.
cve-2018-16435
Vulnerability from cvelistv5
Published
2018-09-04 00:00
Modified
2024-08-05 10:24
Severity ?
EPSS score ?
Summary
Little CMS (aka Little Color Management System) 2.9 has an integer overflow in the AllocateDataSet function in cmscgats.c, leading to a heap-based buffer overflow in the SetData function via a crafted file in the second argument to cmsIT8LoadFromFile.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://access.redhat.com/errata/RHSA-2018:3004 | Third Party Advisory | |
cve@mitre.org | https://github.com/mm2/Little-CMS/commit/768f70ca405cd3159d990e962d54456773bb8cf8 | Patch, Third Party Advisory | |
cve@mitre.org | https://github.com/mm2/Little-CMS/issues/171 | Exploit, Issue Tracking, Patch, Third Party Advisory | |
cve@mitre.org | https://lists.debian.org/debian-lts-announce/2018/09/msg00005.html | Mailing List, Third Party Advisory | |
cve@mitre.org | https://security.gentoo.org/glsa/202105-18 | ||
cve@mitre.org | https://usn.ubuntu.com/3770-1/ | Third Party Advisory | |
cve@mitre.org | https://usn.ubuntu.com/3770-2/ | Third Party Advisory | |
cve@mitre.org | https://www.debian.org/security/2018/dsa-4284 | Third Party Advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:24:32.295Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-3770-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3770-2/" }, { "name": "USN-3770-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3770-1/" }, { "name": "RHSA-2018:3004", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3004" }, { "name": "[debian-lts-announce] 20180906 [SECURITY] [DLA 1496-1] lcms2 security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00005.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/mm2/Little-CMS/issues/171" }, { "name": "DSA-4284", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4284" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/mm2/Little-CMS/commit/768f70ca405cd3159d990e962d54456773bb8cf8" }, { "name": "GLSA-202105-18", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202105-18" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-09-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Little CMS (aka Little Color Management System) 2.9 has an integer overflow in the AllocateDataSet function in cmscgats.c, leading to a heap-based buffer overflow in the SetData function via a crafted file in the second argument to cmsIT8LoadFromFile." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-05-26T10:06:18", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "USN-3770-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3770-2/" }, { "name": "USN-3770-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3770-1/" }, { "name": "RHSA-2018:3004", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3004" }, { "name": "[debian-lts-announce] 20180906 [SECURITY] [DLA 1496-1] lcms2 security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00005.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/mm2/Little-CMS/issues/171" }, { "name": "DSA-4284", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4284" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/mm2/Little-CMS/commit/768f70ca405cd3159d990e962d54456773bb8cf8" }, { "name": "GLSA-202105-18", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202105-18" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-16435", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Little CMS (aka Little Color Management System) 2.9 has an integer overflow in the AllocateDataSet function in cmscgats.c, leading to a heap-based buffer overflow in the SetData function via a crafted file in the second argument to cmsIT8LoadFromFile." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-3770-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3770-2/" }, { "name": "USN-3770-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3770-1/" }, { "name": "RHSA-2018:3004", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3004" }, { "name": "[debian-lts-announce] 20180906 [SECURITY] [DLA 1496-1] lcms2 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00005.html" }, { "name": "https://github.com/mm2/Little-CMS/issues/171", "refsource": "MISC", "url": "https://github.com/mm2/Little-CMS/issues/171" }, { "name": "DSA-4284", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4284" }, { "name": "https://github.com/mm2/Little-CMS/commit/768f70ca405cd3159d990e962d54456773bb8cf8", "refsource": "MISC", "url": "https://github.com/mm2/Little-CMS/commit/768f70ca405cd3159d990e962d54456773bb8cf8" }, { "name": "GLSA-202105-18", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202105-18" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-16435", "datePublished": "2018-09-04T00:00:00", "dateReserved": "2018-09-03T00:00:00", "dateUpdated": "2024-08-05T10:24:32.295Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2018-16435\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2018-09-04T00:29:02.183\",\"lastModified\":\"2021-05-26T11:15:08.243\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Little CMS (aka Little Color Management System) 2.9 has an integer overflow in the AllocateDataSet function in cmscgats.c, leading to a heap-based buffer overflow in the SetData function via a crafted file in the second argument to cmsIT8LoadFromFile.\"},{\"lang\":\"es\",\"value\":\"Little CMS (tambi\u00e9n conocido como Little Color Management System) 2.9 tiene un desbordamiento de enteros en la funci\u00f3n AllocateDataSet en cmscgats.c que conduce a un desbordamiento de b\u00fafer basado en memoria din\u00e1mica (heap) en la funci\u00f3n SetData mediante un archivo manipulado en el segundo argumento en cmsIT8LoadFromFile.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:N/A:P\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":4.3},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-190\"},{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:littlecms:little_cms_color_engine:2.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08FF7CFA-711D-4DF6-A628-388B9569063B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"8D305F7A-D159-4716-AB26-5E38BB5CD991\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B5A6F2F3-4894-4392-8296-3B8DD2679084\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BBCD86A-E6C7-4444-9D74-F861084090F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5ED5807-55B7-47C5-97A6-03233F4FBC3A\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]}],\"references\":[{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3004\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/mm2/Little-CMS/commit/768f70ca405cd3159d990e962d54456773bb8cf8\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/mm2/Little-CMS/issues/171\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/09/msg00005.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202105-18\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://usn.ubuntu.com/3770-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3770-2/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4284\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
ghsa-2w2q-grxm-gr8f
Vulnerability from github
Published
2022-05-13 01:10
Modified
2022-05-13 01:10
Severity ?
Details
Little CMS (aka Little Color Management System) 2.9 has an integer overflow in the AllocateDataSet function in cmscgats.c, leading to a heap-based buffer overflow in the SetData function via a crafted file in the second argument to cmsIT8LoadFromFile.
{ "affected": [], "aliases": [ "CVE-2018-16435" ], "database_specific": { "cwe_ids": [ "CWE-787" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2018-09-04T00:29:00Z", "severity": "MODERATE" }, "details": "Little CMS (aka Little Color Management System) 2.9 has an integer overflow in the AllocateDataSet function in cmscgats.c, leading to a heap-based buffer overflow in the SetData function via a crafted file in the second argument to cmsIT8LoadFromFile.", "id": "GHSA-2w2q-grxm-gr8f", "modified": "2022-05-13T01:10:00Z", "published": "2022-05-13T01:10:00Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16435" }, { "type": "WEB", "url": "https://github.com/mm2/Little-CMS/issues/171" }, { "type": "WEB", "url": "https://github.com/mm2/Little-CMS/commit/768f70ca405cd3159d990e962d54456773bb8cf8" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:3004" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00005.html" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/202105-18" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3770-1" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3770-2" }, { "type": "WEB", "url": "https://www.debian.org/security/2018/dsa-4284" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
gsd-2018-16435
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
Little CMS (aka Little Color Management System) 2.9 has an integer overflow in the AllocateDataSet function in cmscgats.c, leading to a heap-based buffer overflow in the SetData function via a crafted file in the second argument to cmsIT8LoadFromFile.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2018-16435", "description": "Little CMS (aka Little Color Management System) 2.9 has an integer overflow in the AllocateDataSet function in cmscgats.c, leading to a heap-based buffer overflow in the SetData function via a crafted file in the second argument to cmsIT8LoadFromFile.", "id": "GSD-2018-16435", "references": [ "https://www.suse.com/security/cve/CVE-2018-16435.html", "https://www.debian.org/security/2018/dsa-4284", "https://access.redhat.com/errata/RHSA-2018:3004", "https://ubuntu.com/security/CVE-2018-16435", "https://advisories.mageia.org/CVE-2018-16435.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2018-16435" ], "details": "Little CMS (aka Little Color Management System) 2.9 has an integer overflow in the AllocateDataSet function in cmscgats.c, leading to a heap-based buffer overflow in the SetData function via a crafted file in the second argument to cmsIT8LoadFromFile.", "id": "GSD-2018-16435", "modified": "2023-12-13T01:22:25.846235Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-16435", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Little CMS (aka Little Color Management System) 2.9 has an integer overflow in the AllocateDataSet function in cmscgats.c, leading to a heap-based buffer overflow in the SetData function via a crafted file in the second argument to cmsIT8LoadFromFile." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-3770-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3770-2/" }, { "name": "USN-3770-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3770-1/" }, { "name": "RHSA-2018:3004", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3004" }, { "name": "[debian-lts-announce] 20180906 [SECURITY] [DLA 1496-1] lcms2 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00005.html" }, { "name": "https://github.com/mm2/Little-CMS/issues/171", "refsource": "MISC", "url": "https://github.com/mm2/Little-CMS/issues/171" }, { "name": "DSA-4284", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4284" }, { "name": "https://github.com/mm2/Little-CMS/commit/768f70ca405cd3159d990e962d54456773bb8cf8", "refsource": "MISC", "url": "https://github.com/mm2/Little-CMS/commit/768f70ca405cd3159d990e962d54456773bb8cf8" }, { "name": "GLSA-202105-18", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202105-18" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:littlecms:little_cms_color_engine:2.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-16435" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Little CMS (aka Little Color Management System) 2.9 has an integer overflow in the AllocateDataSet function in cmscgats.c, leading to a heap-based buffer overflow in the SetData function via a crafted file in the second argument to cmsIT8LoadFromFile." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-787" }, { "lang": "en", "value": "CWE-190" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/mm2/Little-CMS/issues/171", "refsource": "MISC", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/mm2/Little-CMS/issues/171" }, { "name": "https://github.com/mm2/Little-CMS/commit/768f70ca405cd3159d990e962d54456773bb8cf8", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/mm2/Little-CMS/commit/768f70ca405cd3159d990e962d54456773bb8cf8" }, { "name": "DSA-4284", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4284" }, { "name": "[debian-lts-announce] 20180906 [SECURITY] [DLA 1496-1] lcms2 security update", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00005.html" }, { "name": "USN-3770-2", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3770-2/" }, { "name": "USN-3770-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3770-1/" }, { "name": "RHSA-2018:3004", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3004" }, { "name": "GLSA-202105-18", "refsource": "GENTOO", "tags": [], "url": "https://security.gentoo.org/glsa/202105-18" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": true }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 3.6 } }, "lastModifiedDate": "2021-05-26T11:15Z", "publishedDate": "2018-09-04T00:29Z" } } }
rhsa-2018_3004
Vulnerability from csaf_redhat
Published
2018-10-24 22:06
Modified
2024-11-15 02:13
Summary
Red Hat Security Advisory: chromium-browser security update
Notes
Topic
An update for chromium-browser is now available for Red Hat Enterprise Linux 6 Supplementary.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Chromium is an open-source web browser, powered by WebKit (Blink).
This update upgrades Chromium to version 70.0.3538.67.
Security Fix(es):
* chromium-browser: Sandbox escape in AppCache (CVE-2018-17462)
* chromium-browser: Remote code execution in V8 (CVE-2018-17463)
* chromium-browser: URL spoof in Omnibox (CVE-2018-17464)
* chromium-browser: Use after free in V8 (CVE-2018-17465)
* chromium-browser: Memory corruption in Angle (CVE-2018-17466)
* lcms2: Integer overflow in AllocateDataSet() in cmscgats.c leading to heap-based buffer overflow (CVE-2018-16435)
* chromium-browser: URL spoof in Omnibox (CVE-2018-17467)
* chromium-browser: Cross-origin URL disclosure in Blink (CVE-2018-17468)
* chromium-browser: Heap buffer overflow in PDFium (CVE-2018-17469)
* chromium-browser: Memory corruption in GPU Internals (CVE-2018-17470)
* chromium-browser: Security UI occlusion in full screen mode (CVE-2018-17471)
* chromium-browser: URL spoof in Omnibox (CVE-2018-17473)
* chromium-browser: Use after free in Blink (CVE-2018-17474)
* chromium-browser: Lack of limits on update() in ServiceWorker (CVE-2018-5179)
* chromium-browser: URL spoof in Omnibox (CVE-2018-17475)
* chromium-browser: Security UI occlusion in full screen mode (CVE-2018-17476)
* chromium-browser: UI spoof in Extensions (CVE-2018-17477)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for chromium-browser is now available for Red Hat Enterprise Linux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Chromium is an open-source web browser, powered by WebKit (Blink).\n\nThis update upgrades Chromium to version 70.0.3538.67.\n\nSecurity Fix(es):\n\n* chromium-browser: Sandbox escape in AppCache (CVE-2018-17462)\n\n* chromium-browser: Remote code execution in V8 (CVE-2018-17463)\n\n* chromium-browser: URL spoof in Omnibox (CVE-2018-17464)\n\n* chromium-browser: Use after free in V8 (CVE-2018-17465)\n\n* chromium-browser: Memory corruption in Angle (CVE-2018-17466)\n\n* lcms2: Integer overflow in AllocateDataSet() in cmscgats.c leading to heap-based buffer overflow (CVE-2018-16435)\n\n* chromium-browser: URL spoof in Omnibox (CVE-2018-17467)\n\n* chromium-browser: Cross-origin URL disclosure in Blink (CVE-2018-17468)\n\n* chromium-browser: Heap buffer overflow in PDFium (CVE-2018-17469)\n\n* chromium-browser: Memory corruption in GPU Internals (CVE-2018-17470)\n\n* chromium-browser: Security UI occlusion in full screen mode (CVE-2018-17471)\n\n* chromium-browser: URL spoof in Omnibox (CVE-2018-17473)\n\n* chromium-browser: Use after free in Blink (CVE-2018-17474)\n\n* chromium-browser: Lack of limits on update() in ServiceWorker (CVE-2018-5179)\n\n* chromium-browser: URL spoof in Omnibox (CVE-2018-17475)\n\n* chromium-browser: Security UI occlusion in full screen mode (CVE-2018-17476)\n\n* chromium-browser: UI spoof in Extensions (CVE-2018-17477)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:3004", "url": "https://access.redhat.com/errata/RHSA-2018:3004" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1628969", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1628969" }, { "category": "external", "summary": "1640098", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1640098" }, { "category": "external", "summary": "1640099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1640099" }, { "category": "external", "summary": "1640100", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1640100" }, { "category": "external", "summary": "1640101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1640101" }, { "category": "external", "summary": "1640102", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1640102" }, { "category": "external", "summary": "1640103", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1640103" }, { "category": "external", "summary": "1640104", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1640104" }, { "category": "external", "summary": "1640105", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1640105" }, { "category": "external", "summary": "1640106", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1640106" }, { "category": "external", "summary": "1640107", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1640107" }, { "category": "external", "summary": "1640110", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1640110" }, { "category": "external", "summary": "1640111", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1640111" }, { "category": "external", "summary": "1640112", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1640112" }, { "category": "external", "summary": "1640113", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1640113" }, { "category": "external", "summary": "1640114", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1640114" }, { "category": "external", "summary": "1640115", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1640115" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_3004.json" } ], "title": "Red Hat Security Advisory: chromium-browser security update", "tracking": { "current_release_date": "2024-11-15T02:13:59+00:00", "generator": { "date": "2024-11-15T02:13:59+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2018:3004", "initial_release_date": "2018-10-24T22:06:32+00:00", "revision_history": [ { "date": "2018-10-24T22:06:32+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-10-24T22:06:32+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T02:13:59+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "product": { "name": "chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "product_id": "chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/chromium-browser@70.0.3538.67-1.el6_10?arch=x86_64" } } }, { "category": "product_version", "name": "chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "product": { "name": "chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "product_id": "chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/chromium-browser-debuginfo@70.0.3538.67-1.el6_10?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "chromium-browser-0:70.0.3538.67-1.el6_10.i686", "product": { "name": "chromium-browser-0:70.0.3538.67-1.el6_10.i686", "product_id": "chromium-browser-0:70.0.3538.67-1.el6_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/chromium-browser@70.0.3538.67-1.el6_10?arch=i686" } } }, { "category": "product_version", "name": "chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "product": { "name": "chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "product_id": "chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/chromium-browser-debuginfo@70.0.3538.67-1.el6_10?arch=i686" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:70.0.3538.67-1.el6_10.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686" }, "product_reference": "chromium-browser-0:70.0.3538.67-1.el6_10.i686", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:70.0.3538.67-1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64" }, "product_reference": "chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686" }, "product_reference": "chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64" }, "product_reference": "chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:70.0.3538.67-1.el6_10.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686" }, "product_reference": "chromium-browser-0:70.0.3538.67-1.el6_10.i686", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:70.0.3538.67-1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64" }, "product_reference": "chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686" }, "product_reference": "chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64" }, "product_reference": "chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:70.0.3538.67-1.el6_10.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686" }, "product_reference": "chromium-browser-0:70.0.3538.67-1.el6_10.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:70.0.3538.67-1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64" }, "product_reference": "chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686" }, "product_reference": "chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64" }, "product_reference": "chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-5179", "discovery_date": "2018-10-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1640114" } ], "notes": [ { "category": "description", "text": "A service worker can send the activate event on itself periodically which allows it to run perpetually, allowing it to monitor activity by users. Affects all versions prior to Firefox 60.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Lack of limits on update() in ServiceWorker", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-5179" }, { "category": "external", "summary": "RHBZ#1640114", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1640114" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-5179", "url": "https://www.cve.org/CVERecord?id=CVE-2018-5179" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5179", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5179" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html", "url": "https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html" } ], "release_date": "2018-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-24T22:06:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:3004" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "chromium-browser: Lack of limits on update() in ServiceWorker" }, { "cve": "CVE-2018-16435", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2018-09-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1628969" } ], "notes": [ { "category": "description", "text": "Little CMS (aka Little Color Management System) 2.9 has an integer overflow in the AllocateDataSet function in cmscgats.c, leading to a heap-based buffer overflow in the SetData function via a crafted file in the second argument to cmsIT8LoadFromFile.", "title": "Vulnerability description" }, { "category": "summary", "text": "lcms2: Integer overflow in AllocateDataSet() in cmscgats.c leading to heap-based buffer overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of lcms2 as shipped with Red Hat Enterprise Linux 7.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-16435" }, { "category": "external", "summary": "RHBZ#1628969", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1628969" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-16435", "url": "https://www.cve.org/CVERecord?id=CVE-2018-16435" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-16435", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16435" } ], "release_date": "2018-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-24T22:06:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:3004" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "lcms2: Integer overflow in AllocateDataSet() in cmscgats.c leading to heap-based buffer overflow" }, { "cve": "CVE-2018-17462", "discovery_date": "2018-10-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1640098" } ], "notes": [ { "category": "description", "text": "Incorrect refcounting in AppCache in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to perform a sandbox escape via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Sandbox escape in AppCache", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-17462" }, { "category": "external", "summary": "RHBZ#1640098", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1640098" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-17462", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17462" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-17462", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-17462" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html", "url": "https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html" } ], "release_date": "2018-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-24T22:06:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:3004" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: Sandbox escape in AppCache" }, { "cve": "CVE-2018-17463", "discovery_date": "2018-10-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1640099" } ], "notes": [ { "category": "description", "text": "Incorrect side effect annotation in V8 in Google Chrome prior to 70.0.3538.64 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Remote code execution in V8", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-17463" }, { "category": "external", "summary": "RHBZ#1640099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1640099" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-17463", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17463" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-17463", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-17463" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html", "url": "https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2018-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-24T22:06:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:3004" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-06-08T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "chromium-browser: Remote code execution in V8" }, { "cve": "CVE-2018-17464", "discovery_date": "2018-10-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1640100" } ], "notes": [ { "category": "description", "text": "Incorrect handling of history on iOS in Navigation in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: URL spoof in Omnibox", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-17464" }, { "category": "external", "summary": "RHBZ#1640100", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1640100" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-17464", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17464" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-17464", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-17464" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html", "url": "https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html" } ], "release_date": "2018-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-24T22:06:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:3004" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: URL spoof in Omnibox" }, { "cve": "CVE-2018-17465", "discovery_date": "2018-10-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1640101" } ], "notes": [ { "category": "description", "text": "Incorrect implementation of object trimming in V8 in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Use after free in V8", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-17465" }, { "category": "external", "summary": "RHBZ#1640101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1640101" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-17465", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17465" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-17465", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-17465" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html", "url": "https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html" } ], "release_date": "2018-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-24T22:06:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:3004" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: Use after free in V8" }, { "cve": "CVE-2018-17466", "discovery_date": "2018-10-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1640102" } ], "notes": [ { "category": "description", "text": "Incorrect texture handling in Angle in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "firefox: Memory corruption in Angle", "title": "Vulnerability summary" }, { "category": "other", "text": "In general, this flaw be exploited through email in the Thunderbird product because scripting is disabled when reading mail, but are potentially risks in browser or browser-like contexts.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-17466" }, { "category": "external", "summary": "RHBZ#1640102", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1640102" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-17466", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17466" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-17466", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-17466" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html", "url": "https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html" } ], "release_date": "2018-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-24T22:06:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:3004" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "firefox: Memory corruption in Angle" }, { "cve": "CVE-2018-17467", "discovery_date": "2018-10-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1640103" } ], "notes": [ { "category": "description", "text": "Insufficiently quick clearing of stale rendered content in Navigation in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: URL spoof in Omnibox", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-17467" }, { "category": "external", "summary": "RHBZ#1640103", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1640103" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-17467", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17467" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-17467", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-17467" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html", "url": "https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html" } ], "release_date": "2018-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-24T22:06:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:3004" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: URL spoof in Omnibox" }, { "cve": "CVE-2018-17468", "discovery_date": "2018-10-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1640104" } ], "notes": [ { "category": "description", "text": "Incorrect handling of timer information during navigation in Blink in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to obtain cross origin URLs via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Cross-origin URL disclosure in Blink", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-17468" }, { "category": "external", "summary": "RHBZ#1640104", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1640104" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-17468", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17468" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-17468", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-17468" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html", "url": "https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html" } ], "release_date": "2018-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-24T22:06:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:3004" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: Cross-origin URL disclosure in Blink" }, { "cve": "CVE-2018-17469", "discovery_date": "2018-10-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1640105" } ], "notes": [ { "category": "description", "text": "Incorrect handling of PDF filter chains in PDFium in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to perform an out of bounds memory read via a crafted PDF file.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Heap buffer overflow in PDFium", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-17469" }, { "category": "external", "summary": "RHBZ#1640105", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1640105" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-17469", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17469" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-17469", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-17469" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html", "url": "https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html" } ], "release_date": "2018-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-24T22:06:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:3004" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: Heap buffer overflow in PDFium" }, { "cve": "CVE-2018-17470", "discovery_date": "2018-10-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1640106" } ], "notes": [ { "category": "description", "text": "A heap buffer overflow in GPU in Google Chrome prior to 70.0.3538.67 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Memory corruption in GPU Internals", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-17470" }, { "category": "external", "summary": "RHBZ#1640106", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1640106" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-17470", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17470" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-17470", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-17470" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html", "url": "https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html" } ], "release_date": "2018-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-24T22:06:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:3004" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: Memory corruption in GPU Internals" }, { "cve": "CVE-2018-17471", "discovery_date": "2018-10-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1640107" } ], "notes": [ { "category": "description", "text": "Incorrect dialog placement in WebContents in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to obscure the full screen warning via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Security UI occlusion in full screen mode", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-17471" }, { "category": "external", "summary": "RHBZ#1640107", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1640107" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-17471", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17471" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-17471", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-17471" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html", "url": "https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html" } ], "release_date": "2018-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-24T22:06:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:3004" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: Security UI occlusion in full screen mode" }, { "cve": "CVE-2018-17473", "discovery_date": "2018-10-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1640110" } ], "notes": [ { "category": "description", "text": "Incorrect handling of confusable characters in Omnibox in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: URL spoof in Omnibox", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-17473" }, { "category": "external", "summary": "RHBZ#1640110", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1640110" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-17473", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17473" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-17473", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-17473" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html", "url": "https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html" } ], "release_date": "2018-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-24T22:06:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:3004" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: URL spoof in Omnibox" }, { "cve": "CVE-2018-17474", "discovery_date": "2018-10-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1640111" } ], "notes": [ { "category": "description", "text": "Use after free in HTMLImportsController in Blink in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Use after free in Blink", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-17474" }, { "category": "external", "summary": "RHBZ#1640111", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1640111" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-17474", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17474" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-17474", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-17474" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html", "url": "https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html" } ], "release_date": "2018-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-24T22:06:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:3004" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: Use after free in Blink" }, { "cve": "CVE-2018-17475", "discovery_date": "2018-10-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1640112" } ], "notes": [ { "category": "description", "text": "Incorrect handling of history on iOS in Navigation in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: URL spoof in Omnibox", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-17475" }, { "category": "external", "summary": "RHBZ#1640112", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1640112" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-17475", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-17475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-17475" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html", "url": "https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html" } ], "release_date": "2018-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-24T22:06:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:3004" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "chromium-browser: URL spoof in Omnibox" }, { "cve": "CVE-2018-17476", "discovery_date": "2018-10-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1640113" } ], "notes": [ { "category": "description", "text": "Incorrect dialog placement in Cast UI in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to obscure the full screen warning via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Security UI occlusion in full screen mode", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-17476" }, { "category": "external", "summary": "RHBZ#1640113", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1640113" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-17476", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17476" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-17476", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-17476" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html", "url": "https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html" } ], "release_date": "2018-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-24T22:06:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:3004" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "chromium-browser: Security UI occlusion in full screen mode" }, { "cve": "CVE-2018-17477", "discovery_date": "2018-10-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1640115" } ], "notes": [ { "category": "description", "text": "Incorrect dialog placement in Extensions in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to spoof the contents of extension popups via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: UI spoof in Extensions", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-17477" }, { "category": "external", "summary": "RHBZ#1640115", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1640115" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-17477", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17477" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-17477", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-17477" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html", "url": "https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html" } ], "release_date": "2018-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-24T22:06:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:3004" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:70.0.3538.67-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:70.0.3538.67-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "chromium-browser: UI spoof in Extensions" } ] }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.