RHSA-2017:0206
Vulnerability from csaf_redhat - Published: 2017-01-26 22:02 - Updated: 2025-11-21 17:59Blink in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, incorrectly handled object owner relationships, which allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page.
Blink in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, incorrectly handled the sequence of events when closing a page, which allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page.
Blink in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, allowed attacker controlled JavaScript to be run during the invocation of a private script method, which allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page.
WebRTC in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, failed to perform proper bounds checking, which allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Blink in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, resolved promises in an inappropriate context, which allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page.
Google Chrome prior to 56.0.2924.76 for Windows insufficiently sanitized DevTools URLs, which allowed a remote attacker who convinced a user to install a malicious extension to read filesystem contents via a crafted HTML page.
A heap buffer overflow in V8 in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Google Chrome prior to 56.0.2924.76 for Linux incorrectly handled new tab page navigations in non-selected tabs, which allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
Heap buffer overflow during image processing in Skia in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, incorrectly handled Unicode glyphs, which allowed a remote attacker to perform domain spoofing via IDN homographs in a crafted domain name.
Blink in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, failed to prevent certain UI elements from being displayed by non-visible pages, which allowed a remote attacker to show certain UI elements on a page they don't control via a crafted HTML page.
Interactions with the OS in Google Chrome prior to 56.0.2924.76 for Mac insufficiently cleared video memory, which allowed a remote attacker to possibly extract image fragments on systems with GeForce 8600M graphics chips via a crafted HTML page.
Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, had an insufficiently strict content security policy on the Chrome app launcher page, which allowed a remote attacker to inject scripts or HTML into a privileged page via a crafted HTML page.
A use after free in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, failed to require a user gesture for powerful download operations, which allowed a remote attacker who convinced a user to install a malicious extension to execute arbitrary code via a crafted HTML page.
A use after free in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
Blink in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, failed to properly enforce unsafe-inline content security policy, which allowed a remote attacker to bypass content security policy via a crafted HTML page.
Type confusion in Histogram in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, allowed a remote attacker to potentially exploit a near null dereference via a crafted HTML page.
FFmpeg in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, failed to perform proper bounds checking, which allowed a remote attacker to potentially exploit heap corruption via a crafted video file.
FFmpeg in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, failed to perform proper bounds checking, which allowed a remote attacker to potentially exploit heap corruption via a crafted video file.
Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, failed to prevent alerts from being displayed by swapped out frames, which allowed a remote attacker to show alerts on a page they don't control via a crafted HTML page.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for chromium-browser is now available for Red Hat Enterprise Linux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Chromium is an open-source web browser, powered by WebKit (Blink).\n\nThis update upgrades Chromium to version 56.0.2924.76.\n\nSecurity Fix(es):\n\n* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash, execute arbitrary code, or disclose sensitive information when visited by the victim. (CVE-2017-5006, CVE-2017-5007, CVE-2017-5008, CVE-2017-5009, CVE-2017-5010, CVE-2017-5011, CVE-2017-5012, CVE-2017-5013, CVE-2017-5014, CVE-2017-5015, CVE-2017-5016, CVE-2017-5017, CVE-2017-5018, CVE-2017-5019, CVE-2017-5020, CVE-2017-5021, CVE-2017-5022, CVE-2017-5023, CVE-2017-5024, CVE-2017-5025, CVE-2017-5026)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2017:0206",
"url": "https://access.redhat.com/errata/RHSA-2017:0206"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html",
"url": "https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html"
},
{
"category": "external",
"summary": "1416657",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416657"
},
{
"category": "external",
"summary": "1416658",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416658"
},
{
"category": "external",
"summary": "1416659",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416659"
},
{
"category": "external",
"summary": "1416660",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416660"
},
{
"category": "external",
"summary": "1416661",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416661"
},
{
"category": "external",
"summary": "1416662",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416662"
},
{
"category": "external",
"summary": "1416663",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416663"
},
{
"category": "external",
"summary": "1416664",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416664"
},
{
"category": "external",
"summary": "1416665",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416665"
},
{
"category": "external",
"summary": "1416666",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416666"
},
{
"category": "external",
"summary": "1416667",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416667"
},
{
"category": "external",
"summary": "1416668",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416668"
},
{
"category": "external",
"summary": "1416669",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416669"
},
{
"category": "external",
"summary": "1416670",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416670"
},
{
"category": "external",
"summary": "1416671",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416671"
},
{
"category": "external",
"summary": "1416672",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416672"
},
{
"category": "external",
"summary": "1416673",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416673"
},
{
"category": "external",
"summary": "1416674",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416674"
},
{
"category": "external",
"summary": "1416675",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416675"
},
{
"category": "external",
"summary": "1416676",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416676"
},
{
"category": "external",
"summary": "1416677",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416677"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_0206.json"
}
],
"title": "Red Hat Security Advisory: chromium-browser security update",
"tracking": {
"current_release_date": "2025-11-21T17:59:16+00:00",
"generator": {
"date": "2025-11-21T17:59:16+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2017:0206",
"initial_release_date": "2017-01-26T22:02:24+00:00",
"revision_history": [
{
"date": "2017-01-26T22:02:24+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2017-01-26T22:02:24+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:59:16+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.8.z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.8.z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.8.z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux Supplementary"
},
{
"branches": [
{
"category": "product_version",
"name": "chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"product": {
"name": "chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"product_id": "chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/chromium-browser@56.0.2924.76-1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"product": {
"name": "chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"product_id": "chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/chromium-browser-debuginfo@56.0.2924.76-1.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "chromium-browser-0:56.0.2924.76-1.el6.i686",
"product": {
"name": "chromium-browser-0:56.0.2924.76-1.el6.i686",
"product_id": "chromium-browser-0:56.0.2924.76-1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/chromium-browser@56.0.2924.76-1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"product": {
"name": "chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"product_id": "chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/chromium-browser-debuginfo@56.0.2924.76-1.el6?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-browser-0:56.0.2924.76-1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686"
},
"product_reference": "chromium-browser-0:56.0.2924.76-1.el6.i686",
"relates_to_product_reference": "6Client-Supplementary-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-browser-0:56.0.2924.76-1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64"
},
"product_reference": "chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"relates_to_product_reference": "6Client-Supplementary-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686"
},
"product_reference": "chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"relates_to_product_reference": "6Client-Supplementary-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
},
"product_reference": "chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"relates_to_product_reference": "6Client-Supplementary-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-browser-0:56.0.2924.76-1.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686"
},
"product_reference": "chromium-browser-0:56.0.2924.76-1.el6.i686",
"relates_to_product_reference": "6Server-Supplementary-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-browser-0:56.0.2924.76-1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64"
},
"product_reference": "chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"relates_to_product_reference": "6Server-Supplementary-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686"
},
"product_reference": "chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"relates_to_product_reference": "6Server-Supplementary-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
},
"product_reference": "chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"relates_to_product_reference": "6Server-Supplementary-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-browser-0:56.0.2924.76-1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686"
},
"product_reference": "chromium-browser-0:56.0.2924.76-1.el6.i686",
"relates_to_product_reference": "6Workstation-Supplementary-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-browser-0:56.0.2924.76-1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64"
},
"product_reference": "chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686"
},
"product_reference": "chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"relates_to_product_reference": "6Workstation-Supplementary-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
},
"product_reference": "chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary-6.8.z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5006",
"discovery_date": "2017-01-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1416658"
}
],
"notes": [
{
"category": "description",
"text": "Blink in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, incorrectly handled object owner relationships, which allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "chromium-browser: universal xss in blink",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5006"
},
{
"category": "external",
"summary": "RHBZ#1416658",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416658"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5006",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5006"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5006",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5006"
},
{
"category": "external",
"summary": "https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html",
"url": "https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html"
}
],
"release_date": "2017-01-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-01-26T22:02:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.",
"product_ids": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:0206"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "chromium-browser: universal xss in blink"
},
{
"cve": "CVE-2017-5007",
"discovery_date": "2017-01-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1416657"
}
],
"notes": [
{
"category": "description",
"text": "Blink in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, incorrectly handled the sequence of events when closing a page, which allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "chromium-browser: universal xss in blink",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5007"
},
{
"category": "external",
"summary": "RHBZ#1416657",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416657"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5007",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5007"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5007",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5007"
},
{
"category": "external",
"summary": "https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html",
"url": "https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html"
}
],
"release_date": "2017-01-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-01-26T22:02:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.",
"product_ids": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:0206"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "chromium-browser: universal xss in blink"
},
{
"cve": "CVE-2017-5008",
"discovery_date": "2017-01-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1416659"
}
],
"notes": [
{
"category": "description",
"text": "Blink in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, allowed attacker controlled JavaScript to be run during the invocation of a private script method, which allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "chromium-browser: universal xss in blink",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5008"
},
{
"category": "external",
"summary": "RHBZ#1416659",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416659"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5008",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5008"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5008",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5008"
},
{
"category": "external",
"summary": "https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html",
"url": "https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html"
}
],
"release_date": "2017-01-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-01-26T22:02:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.",
"product_ids": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:0206"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "chromium-browser: universal xss in blink"
},
{
"cve": "CVE-2017-5009",
"discovery_date": "2017-01-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1416662"
}
],
"notes": [
{
"category": "description",
"text": "WebRTC in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, failed to perform proper bounds checking, which allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "chromium-browser: out of bounds memory access in webrtc",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5009"
},
{
"category": "external",
"summary": "RHBZ#1416662",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416662"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5009",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5009"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5009",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5009"
},
{
"category": "external",
"summary": "https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html",
"url": "https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html"
}
],
"release_date": "2017-01-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-01-26T22:02:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.",
"product_ids": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:0206"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "chromium-browser: out of bounds memory access in webrtc"
},
{
"cve": "CVE-2017-5010",
"discovery_date": "2017-01-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1416660"
}
],
"notes": [
{
"category": "description",
"text": "Blink in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, resolved promises in an inappropriate context, which allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "chromium-browser: universal xss in blink",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5010"
},
{
"category": "external",
"summary": "RHBZ#1416660",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416660"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5010",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5010"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5010",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5010"
},
{
"category": "external",
"summary": "https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html",
"url": "https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html"
}
],
"release_date": "2017-01-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-01-26T22:02:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.",
"product_ids": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:0206"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "chromium-browser: universal xss in blink"
},
{
"cve": "CVE-2017-5011",
"discovery_date": "2017-01-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1416661"
}
],
"notes": [
{
"category": "description",
"text": "Google Chrome prior to 56.0.2924.76 for Windows insufficiently sanitized DevTools URLs, which allowed a remote attacker who convinced a user to install a malicious extension to read filesystem contents via a crafted HTML page.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "chromium-browser: unauthorised file access in devtools",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5011"
},
{
"category": "external",
"summary": "RHBZ#1416661",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416661"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5011",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5011"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5011",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5011"
},
{
"category": "external",
"summary": "https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html",
"url": "https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html"
}
],
"release_date": "2017-01-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-01-26T22:02:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.",
"product_ids": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:0206"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "chromium-browser: unauthorised file access in devtools"
},
{
"cve": "CVE-2017-5012",
"discovery_date": "2017-01-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1416663"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow in V8 in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "chromium-browser: heap overflow in v8",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5012"
},
{
"category": "external",
"summary": "RHBZ#1416663",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416663"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5012",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5012"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5012",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5012"
},
{
"category": "external",
"summary": "https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html",
"url": "https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html"
}
],
"release_date": "2017-01-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-01-26T22:02:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.",
"product_ids": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:0206"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "chromium-browser: heap overflow in v8"
},
{
"cve": "CVE-2017-5013",
"discovery_date": "2017-01-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1416664"
}
],
"notes": [
{
"category": "description",
"text": "Google Chrome prior to 56.0.2924.76 for Linux incorrectly handled new tab page navigations in non-selected tabs, which allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "chromium-browser: address spoofing in omnibox",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5013"
},
{
"category": "external",
"summary": "RHBZ#1416664",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416664"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5013",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5013"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5013",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5013"
},
{
"category": "external",
"summary": "https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html",
"url": "https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html"
}
],
"release_date": "2017-01-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-01-26T22:02:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.",
"product_ids": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:0206"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "chromium-browser: address spoofing in omnibox"
},
{
"cve": "CVE-2017-5014",
"discovery_date": "2017-01-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1416665"
}
],
"notes": [
{
"category": "description",
"text": "Heap buffer overflow during image processing in Skia in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "chromium-browser: heap overflow in skia",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5014"
},
{
"category": "external",
"summary": "RHBZ#1416665",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416665"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5014",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5014"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5014",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5014"
},
{
"category": "external",
"summary": "https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html",
"url": "https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html"
}
],
"release_date": "2017-01-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-01-26T22:02:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.",
"product_ids": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:0206"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "chromium-browser: heap overflow in skia"
},
{
"cve": "CVE-2017-5015",
"discovery_date": "2017-01-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1416666"
}
],
"notes": [
{
"category": "description",
"text": "Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, incorrectly handled Unicode glyphs, which allowed a remote attacker to perform domain spoofing via IDN homographs in a crafted domain name.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "chromium-browser: address spoofing in omnibox",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5015"
},
{
"category": "external",
"summary": "RHBZ#1416666",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416666"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5015",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5015"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5015",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5015"
},
{
"category": "external",
"summary": "https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html",
"url": "https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html"
}
],
"release_date": "2017-01-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-01-26T22:02:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.",
"product_ids": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:0206"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "chromium-browser: address spoofing in omnibox"
},
{
"cve": "CVE-2017-5016",
"discovery_date": "2017-01-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1416668"
}
],
"notes": [
{
"category": "description",
"text": "Blink in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, failed to prevent certain UI elements from being displayed by non-visible pages, which allowed a remote attacker to show certain UI elements on a page they don\u0027t control via a crafted HTML page.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "chromium-browser: ui spoofing in blink",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5016"
},
{
"category": "external",
"summary": "RHBZ#1416668",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416668"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5016",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5016"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5016",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5016"
},
{
"category": "external",
"summary": "https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html",
"url": "https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html"
}
],
"release_date": "2017-01-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-01-26T22:02:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.",
"product_ids": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:0206"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "chromium-browser: ui spoofing in blink"
},
{
"cve": "CVE-2017-5017",
"discovery_date": "2017-01-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1416669"
}
],
"notes": [
{
"category": "description",
"text": "Interactions with the OS in Google Chrome prior to 56.0.2924.76 for Mac insufficiently cleared video memory, which allowed a remote attacker to possibly extract image fragments on systems with GeForce 8600M graphics chips via a crafted HTML page.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "chromium-browser: uninitialised memory access in webm video",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5017"
},
{
"category": "external",
"summary": "RHBZ#1416669",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416669"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5017",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5017"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5017",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5017"
},
{
"category": "external",
"summary": "https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html",
"url": "https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html"
}
],
"release_date": "2017-01-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-01-26T22:02:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.",
"product_ids": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:0206"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "chromium-browser: uninitialised memory access in webm video"
},
{
"cve": "CVE-2017-5018",
"discovery_date": "2017-01-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1416670"
}
],
"notes": [
{
"category": "description",
"text": "Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, had an insufficiently strict content security policy on the Chrome app launcher page, which allowed a remote attacker to inject scripts or HTML into a privileged page via a crafted HTML page.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "chromium-browser: universal xss in chrome://apps",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5018"
},
{
"category": "external",
"summary": "RHBZ#1416670",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416670"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5018",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5018"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5018",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5018"
},
{
"category": "external",
"summary": "https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html",
"url": "https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html"
}
],
"release_date": "2017-01-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-01-26T22:02:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.",
"product_ids": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:0206"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "chromium-browser: universal xss in chrome://apps"
},
{
"cve": "CVE-2017-5019",
"discovery_date": "2017-01-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1416667"
}
],
"notes": [
{
"category": "description",
"text": "A use after free in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "chromium-browser: use after free in renderer",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5019"
},
{
"category": "external",
"summary": "RHBZ#1416667",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416667"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5019",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5019"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5019",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5019"
},
{
"category": "external",
"summary": "https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html",
"url": "https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html"
}
],
"release_date": "2017-01-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-01-26T22:02:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.",
"product_ids": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:0206"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "chromium-browser: use after free in renderer"
},
{
"cve": "CVE-2017-5020",
"discovery_date": "2017-01-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1416671"
}
],
"notes": [
{
"category": "description",
"text": "Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, failed to require a user gesture for powerful download operations, which allowed a remote attacker who convinced a user to install a malicious extension to execute arbitrary code via a crafted HTML page.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "chromium-browser: universal xss in chrome://downloads",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5020"
},
{
"category": "external",
"summary": "RHBZ#1416671",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416671"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5020",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5020"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5020",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5020"
},
{
"category": "external",
"summary": "https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html",
"url": "https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html"
}
],
"release_date": "2017-01-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-01-26T22:02:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.",
"product_ids": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:0206"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "chromium-browser: universal xss in chrome://downloads"
},
{
"cve": "CVE-2017-5021",
"discovery_date": "2017-01-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1416672"
}
],
"notes": [
{
"category": "description",
"text": "A use after free in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "chromium-browser: use after free in extensions",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5021"
},
{
"category": "external",
"summary": "RHBZ#1416672",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416672"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5021",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5021"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5021",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5021"
},
{
"category": "external",
"summary": "https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html",
"url": "https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html"
}
],
"release_date": "2017-01-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-01-26T22:02:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.",
"product_ids": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:0206"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "chromium-browser: use after free in extensions"
},
{
"cve": "CVE-2017-5022",
"discovery_date": "2017-01-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1416673"
}
],
"notes": [
{
"category": "description",
"text": "Blink in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, failed to properly enforce unsafe-inline content security policy, which allowed a remote attacker to bypass content security policy via a crafted HTML page.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "chromium-browser: bypass of content security policy in blink",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5022"
},
{
"category": "external",
"summary": "RHBZ#1416673",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416673"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5022",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5022"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5022",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5022"
},
{
"category": "external",
"summary": "https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html",
"url": "https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html"
}
],
"release_date": "2017-01-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-01-26T22:02:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.",
"product_ids": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:0206"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "chromium-browser: bypass of content security policy in blink"
},
{
"cve": "CVE-2017-5023",
"discovery_date": "2017-01-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1416674"
}
],
"notes": [
{
"category": "description",
"text": "Type confusion in Histogram in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, allowed a remote attacker to potentially exploit a near null dereference via a crafted HTML page.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "chromium-browser: type confusion in metrics",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5023"
},
{
"category": "external",
"summary": "RHBZ#1416674",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416674"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5023",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5023"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5023",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5023"
},
{
"category": "external",
"summary": "https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html",
"url": "https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html"
}
],
"release_date": "2017-01-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-01-26T22:02:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.",
"product_ids": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:0206"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "chromium-browser: type confusion in metrics"
},
{
"cve": "CVE-2017-5024",
"discovery_date": "2017-01-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1416675"
}
],
"notes": [
{
"category": "description",
"text": "FFmpeg in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, failed to perform proper bounds checking, which allowed a remote attacker to potentially exploit heap corruption via a crafted video file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "chromium-browser: heap overflow in ffmpeg",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5024"
},
{
"category": "external",
"summary": "RHBZ#1416675",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416675"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5024",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5024"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5024",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5024"
},
{
"category": "external",
"summary": "https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html",
"url": "https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html"
}
],
"release_date": "2017-01-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-01-26T22:02:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.",
"product_ids": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:0206"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "chromium-browser: heap overflow in ffmpeg"
},
{
"cve": "CVE-2017-5025",
"discovery_date": "2017-01-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1416676"
}
],
"notes": [
{
"category": "description",
"text": "FFmpeg in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, failed to perform proper bounds checking, which allowed a remote attacker to potentially exploit heap corruption via a crafted video file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "chromium-browser: heap overflow in ffmpeg",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5025"
},
{
"category": "external",
"summary": "RHBZ#1416676",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416676"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5025"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5025",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5025"
},
{
"category": "external",
"summary": "https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html",
"url": "https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html"
}
],
"release_date": "2017-01-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-01-26T22:02:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.",
"product_ids": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:0206"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "chromium-browser: heap overflow in ffmpeg"
},
{
"cve": "CVE-2017-5026",
"discovery_date": "2017-01-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1416677"
}
],
"notes": [
{
"category": "description",
"text": "Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, failed to prevent alerts from being displayed by swapped out frames, which allowed a remote attacker to show alerts on a page they don\u0027t control via a crafted HTML page.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "chromium-browser: ui spoofing",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5026"
},
{
"category": "external",
"summary": "RHBZ#1416677",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416677"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5026",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5026"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5026",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5026"
},
{
"category": "external",
"summary": "https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html",
"url": "https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html"
}
],
"release_date": "2017-01-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-01-26T22:02:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.",
"product_ids": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:0206"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Client-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Server-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-0:56.0.2924.76-1.el6.x86_64",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.i686",
"6Workstation-Supplementary-6.8.z:chromium-browser-debuginfo-0:56.0.2924.76-1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "chromium-browser: ui spoofing"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.