-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Important: chromium-browser security update Advisory ID: RHSA-2018:2666-01 Product: Red Hat Enterprise Linux Supplementary Advisory URL: https://access.redhat.com/errata/RHSA-2018:2666 Issue date: 2018-09-10 CVE Names: CVE-2018-16065 CVE-2018-16066 CVE-2018-16067 CVE-2018-16068 CVE-2018-16069 CVE-2018-16070 CVE-2018-16071 CVE-2018-16073 CVE-2018-16074 CVE-2018-16075 CVE-2018-16076 CVE-2018-16077 CVE-2018-16078 CVE-2018-16079 CVE-2018-16080 CVE-2018-16081 CVE-2018-16082 CVE-2018-16083 CVE-2018-16084 CVE-2018-16085 CVE-2018-16086 CVE-2018-16087 CVE-2018-16088 ==================================================================== 1. Summary: An update for chromium-browser is now available for Red Hat Enterprise Linux 6 Supplementary. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64 3. Description: Chromium is an open-source web browser, powered by WebKit (Blink). This update upgrades Chromium to version 69.0.3497.81. Security Fix(es): * chromium-browser: Out of bounds write in V8 (CVE-2018-16065) * chromium-browser: Out of bounds read in Blink (CVE-2018-16066) * chromium-browser: Out of bounds read in WebAudio (CVE-2018-16067) * chromium-browser: Out of bounds write in Mojo (CVE-2018-16068) * chromium-browser: Out of bounds read in SwiftShader (CVE-2018-16069) * chromium-browser: Integer overflow in Skia (CVE-2018-16070) * chromium-browser: Use after free in WebRTC (CVE-2018-16071) * chromium-browser: Site Isolation bypass after tab restore (CVE-2018-16073) * chromium-browser: Site Isolation bypass using Blob URLS (CVE-2018-16074) * chromium-browser: Local file access in Blink (CVE-2018-16075) * chromium-browser: Out of bounds read in PDFium (CVE-2018-16076) * chromium-browser: Content security policy bypass in Blink (CVE-2018-16077) * chromium-browser: Credit card information leak in Autofill (CVE-2018-16078) * chromium-browser: URL spoof in permission dialogs (CVE-2018-16079) * chromium-browser: URL spoof in full screen mode (CVE-2018-16080) * chromium-browser: Local file access in DevTools (CVE-2018-16081) * chromium-browser: Stack buffer overflow in SwiftShader (CVE-2018-16082) * chromium-browser: Out of bounds read in WebRTC (CVE-2018-16083) * chromium-browser: User confirmation bypass in external protocol handling (CVE-2018-16084) * chromium-browser: Use after free in Memory Instrumentation (CVE-2018-16085) * chromium-browser: Script injection in New Tab Page (CVE-2018-16086) * chromium-browser: Multiple download restriction bypass (CVE-2018-16087) * chromium-browser: User gesture requirement bypass (CVE-2018-16088) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, Chromium must be restarted for the changes to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1625466 - CVE-2018-16065 chromium-browser: Out of bounds write in V8 1625467 - CVE-2018-16066 chromium-browser: Out of bounds read in Blink 1625469 - CVE-2018-16067 chromium-browser: Out of bounds read in WebAudio 1625470 - CVE-2018-16068 chromium-browser: Out of bounds write in Mojo 1625471 - CVE-2018-16069 chromium-browser: Out of bounds read in SwiftShader 1625472 - CVE-2018-16070 chromium-browser: Integer overflow in Skia 1625473 - CVE-2018-16071 chromium-browser: Use after free in WebRTC 1625475 - CVE-2018-16073 chromium-browser: Site Isolation bypass after tab restore 1625476 - CVE-2018-16074 chromium-browser: Site Isolation bypass using Blob URLS 1625477 - CVE-2018-16075 chromium-browser: Local file access in Blink 1625478 - CVE-2018-16076 chromium-browser: Out of bounds read in PDFium 1625479 - CVE-2018-16077 chromium-browser: Content security policy bypass in Blink 1625480 - CVE-2018-16078 chromium-browser: Credit card information leak in Autofill 1625481 - CVE-2018-16079 chromium-browser: URL spoof in permission dialogs 1625482 - CVE-2018-16080 chromium-browser: URL spoof in full screen mode 1625484 - CVE-2018-16081 chromium-browser: Local file access in DevTools 1625485 - CVE-2018-16082 chromium-browser: Stack buffer overflow in SwiftShader 1625486 - CVE-2018-16083 chromium-browser: Out of bounds read in WebRTC 1625487 - CVE-2018-16084 chromium-browser: User confirmation bypass in external protocol handling 1625488 - CVE-2018-16085 chromium-browser: Use after free in Memory Instrumentation 1626286 - CVE-2018-16088 chromium-browser: User gesture requirement bypass 1626287 - CVE-2018-16087 chromium-browser: Multiple download restriction bypass 1626288 - CVE-2018-16086 chromium-browser: Script injection in New Tab Page 6. Package List: Red Hat Enterprise Linux Desktop Supplementary (v. 6): i386: chromium-browser-69.0.3497.81-1.el6_10.i686.rpm chromium-browser-debuginfo-69.0.3497.81-1.el6_10.i686.rpm x86_64: chromium-browser-69.0.3497.81-1.el6_10.x86_64.rpm chromium-browser-debuginfo-69.0.3497.81-1.el6_10.x86_64.rpm Red Hat Enterprise Linux Server Supplementary (v. 6): i386: chromium-browser-69.0.3497.81-1.el6_10.i686.rpm chromium-browser-debuginfo-69.0.3497.81-1.el6_10.i686.rpm x86_64: chromium-browser-69.0.3497.81-1.el6_10.x86_64.rpm chromium-browser-debuginfo-69.0.3497.81-1.el6_10.x86_64.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 6): i386: chromium-browser-69.0.3497.81-1.el6_10.i686.rpm chromium-browser-debuginfo-69.0.3497.81-1.el6_10.i686.rpm x86_64: chromium-browser-69.0.3497.81-1.el6_10.x86_64.rpm chromium-browser-debuginfo-69.0.3497.81-1.el6_10.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2018-16065 https://access.redhat.com/security/cve/CVE-2018-16066 https://access.redhat.com/security/cve/CVE-2018-16067 https://access.redhat.com/security/cve/CVE-2018-16068 https://access.redhat.com/security/cve/CVE-2018-16069 https://access.redhat.com/security/cve/CVE-2018-16070 https://access.redhat.com/security/cve/CVE-2018-16071 https://access.redhat.com/security/cve/CVE-2018-16073 https://access.redhat.com/security/cve/CVE-2018-16074 https://access.redhat.com/security/cve/CVE-2018-16075 https://access.redhat.com/security/cve/CVE-2018-16076 https://access.redhat.com/security/cve/CVE-2018-16077 https://access.redhat.com/security/cve/CVE-2018-16078 https://access.redhat.com/security/cve/CVE-2018-16079 https://access.redhat.com/security/cve/CVE-2018-16080 https://access.redhat.com/security/cve/CVE-2018-16081 https://access.redhat.com/security/cve/CVE-2018-16082 https://access.redhat.com/security/cve/CVE-2018-16083 https://access.redhat.com/security/cve/CVE-2018-16084 https://access.redhat.com/security/cve/CVE-2018-16085 https://access.redhat.com/security/cve/CVE-2018-16086 https://access.redhat.com/security/cve/CVE-2018-16087 https://access.redhat.com/security/cve/CVE-2018-16088 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2018 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBW5bioNzjgjWX9erEAQizow//brLYe8NF07UKL+CRDDTAz57gEvWDgp00 +DdBBWiax8Ki5sZ824r7T9vKyE5nNccio9fNHpML5/OZEB3XULsacIlVBVH+Rcvd UseY/TYidadmwxYSppkAxxqrHFqiVeFq1Dc0TsYeUwJzWp6Au05zt+Tp51ihHPOi HQgkJ402MJ39T7S0RIWiWR07zuW2u6SR461zuLw19FKGPi1gfH3GkGHYAUXHoabq xRGGkbwlKefudrs2mRC1AjHpNEYf3Xv7eq7L/6q9n1gGERJv1ptbrPmPjI3/thoC uENRcAoURwYoD/AmJyan/Aw3y/LrwepY7I4GFlhV+nP61pVk55V/i4FQl7mpsKui mN746lmAgBJdaJRX6VYJu4Ac3a+Z9w/mv1WAMIVNMwpx68UAuSDo/Cg3PwyHhw1v vd1U2XyaZEG2ZIi/w/3eKNjmYRgcaAEtWh7RX/9ylTh2VkpdtgtUWiZkAMJUMylI swnEnSbjgk8NNcmHQ+NWs3kAWrhgFhAnZJfRNdR72WhzokJqLGUb5Qo4AjAMzSJz NG8KQ26A6gA7aWYyHHB/zEukrH69Ww0X508DlzH5xNF43ozUGrU6NzwpYQ4y7mXR z3S+HOO605VdY2d/zSgICwTXKJEYAoTfQ1tUigx4zjyHkDCO4ap7grBGes3Tfza9 Kms3TPiA6B4=y9ZF -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce