- Issued:
- 2019-02-11
- Updated:
- 2019-02-11
RHSA-2019:0309 - Security Advisory
Synopsis
Critical: chromium-browser security update
Type/Severity
Security Advisory: Critical
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An update for chromium-browser is now available for Red Hat Enterprise Linux 6 Supplementary.
Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Chromium is an open-source web browser, powered by WebKit (Blink).
This update upgrades Chromium to version 72.0.3626.81.
Security Fix(es):
- chromium-browser: Inappropriate implementation in QUIC Networking (CVE-2019-5754)
- chromium-browser: Inappropriate implementation in V8 (CVE-2019-5755)
- chromium-browser: Use after free in PDFium (CVE-2019-5756)
- chromium-browser: Type Confusion in SVG (CVE-2019-5757)
- chromium-browser: Use after free in Blink (CVE-2019-5758)
- chromium-browser: Use after free in HTML select elements (CVE-2019-5759)
- chromium-browser: Use after free in WebRTC (CVE-2019-5760)
- chromium-browser: Use after free in SwiftShader (CVE-2019-5761)
- chromium-browser: Use after free in PDFium (CVE-2019-5762)
- chromium-browser: Insufficient validation of untrusted input in V8 (CVE-2019-5763)
- chromium-browser: Use after free in WebRTC (CVE-2019-5764)
- chromium-browser: Insufficient policy enforcement in the browser (CVE-2019-5765)
- chromium-browser: Inappropriate implementation in V8 (CVE-2019-5782)
- chromium-browser: Insufficient policy enforcement in Canvas (CVE-2019-5766)
- chromium-browser: Incorrect security UI in WebAPKs (CVE-2019-5767)
- chromium-browser: Insufficient policy enforcement in DevTools (CVE-2019-5768)
- chromium-browser: Insufficient validation of untrusted input in Blink (CVE-2019-5769)
- chromium-browser: Heap buffer overflow in WebGL (CVE-2019-5770)
- chromium-browser: Heap buffer overflow in SwiftShader (CVE-2019-5771)
- chromium-browser: Use after free in PDFium (CVE-2019-5772)
- chromium-browser: Insufficient data validation in IndexedDB (CVE-2019-5773)
- chromium-browser: Insufficient validation of untrusted input in SafeBrowsing (CVE-2019-5774)
- chromium-browser: Insufficient policy enforcement in Omnibox (CVE-2019-5775)
- chromium-browser: Insufficient policy enforcement in Omnibox (CVE-2019-5776)
- chromium-browser: Insufficient policy enforcement in Omnibox (CVE-2019-5777)
- chromium-browser: Insufficient policy enforcement in Extensions (CVE-2019-5778)
- chromium-browser: Insufficient policy enforcement in ServiceWorker (CVE-2019-5779)
- chromium-browser: Insufficient policy enforcement (CVE-2019-5780)
- chromium-browser: Insufficient policy enforcement in Omnibox (CVE-2019-5781)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing the update, Chromium must be restarted for the changes to take effect.
Affected Products
- Red Hat Enterprise Linux Server 6 x86_64
- Red Hat Enterprise Linux Server 6 i386
- Red Hat Enterprise Linux Workstation 6 x86_64
- Red Hat Enterprise Linux Workstation 6 i386
- Red Hat Enterprise Linux Desktop 6 x86_64
- Red Hat Enterprise Linux Desktop 6 i386
Fixes
- BZ - 1670737 - CVE-2019-5754 chromium-browser: Inappropriate implementation in QUIC Networking
- BZ - 1670738 - CVE-2019-5782 chromium-browser: Inappropriate implementation in V8
- BZ - 1670739 - CVE-2019-5755 chromium-browser: Inappropriate implementation in V8
- BZ - 1670740 - CVE-2019-5756 chromium-browser: Use after free in PDFium
- BZ - 1670741 - CVE-2019-5757 chromium-browser: Type Confusion in SVG
- BZ - 1670742 - CVE-2019-5758 chromium-browser: Use after free in Blink
- BZ - 1670743 - CVE-2019-5759 chromium-browser: Use after free in HTML select elements
- BZ - 1670744 - CVE-2019-5760 chromium-browser: Use after free in WebRTC
- BZ - 1670745 - CVE-2019-5761 chromium-browser: Use after free in SwiftShader
- BZ - 1670746 - CVE-2019-5762 chromium-browser: Use after free in PDFium
- BZ - 1670747 - CVE-2019-5763 chromium-browser: Insufficient validation of untrusted input in V8
- BZ - 1670748 - CVE-2019-5764 chromium-browser: Use after free in WebRTC
- BZ - 1670749 - CVE-2019-5765 chromium-browser: Insufficient policy enforcement in the browser
- BZ - 1670750 - CVE-2019-5766 chromium-browser: Insufficient policy enforcement in Canvas
- BZ - 1670751 - CVE-2019-5767 chromium-browser: Incorrect security UI in WebAPKs
- BZ - 1670752 - CVE-2019-5768 chromium-browser: Insufficient policy enforcement in DevTools
- BZ - 1670753 - CVE-2019-5769 chromium-browser: Insufficient validation of untrusted input in Blink
- BZ - 1670754 - CVE-2019-5770 chromium-browser: Heap buffer overflow in WebGL
- BZ - 1670755 - CVE-2019-5771 chromium-browser: Heap buffer overflow in SwiftShader
- BZ - 1670756 - CVE-2019-5772 chromium-browser: Use after free in PDFium
- BZ - 1670757 - CVE-2019-5773 chromium-browser: Insufficient data validation in IndexedDB
- BZ - 1670758 - CVE-2019-5774 chromium-browser: Insufficient validation of untrusted input in SafeBrowsing
- BZ - 1670759 - CVE-2019-5775 chromium-browser: Insufficient policy enforcement in Omnibox
- BZ - 1670760 - CVE-2019-5776 chromium-browser: Insufficient policy enforcement in Omnibox
- BZ - 1670761 - CVE-2019-5777 chromium-browser: Insufficient policy enforcement in Omnibox
- BZ - 1670762 - CVE-2019-5778 chromium-browser: Insufficient policy enforcement in Extensions
- BZ - 1670763 - CVE-2019-5779 chromium-browser: Insufficient policy enforcement in ServiceWorker
- BZ - 1670764 - CVE-2019-5780 chromium-browser: Insufficient policy enforcement
- BZ - 1670771 - CVE-2019-5781 chromium-browser: Insufficient policy enforcement in Omnibox
CVEs
- CVE-2019-5754
- CVE-2019-5755
- CVE-2019-5756
- CVE-2019-5757
- CVE-2019-5758
- CVE-2019-5759
- CVE-2019-5760
- CVE-2019-5761
- CVE-2019-5762
- CVE-2019-5763
- CVE-2019-5764
- CVE-2019-5765
- CVE-2019-5766
- CVE-2019-5767
- CVE-2019-5768
- CVE-2019-5769
- CVE-2019-5770
- CVE-2019-5771
- CVE-2019-5772
- CVE-2019-5773
- CVE-2019-5774
- CVE-2019-5775
- CVE-2019-5776
- CVE-2019-5777
- CVE-2019-5778
- CVE-2019-5779
- CVE-2019-5780
- CVE-2019-5781
- CVE-2019-5782
Red Hat Enterprise Linux Server 6
SRPM | |
---|---|
x86_64 | |
chromium-browser-72.0.3626.81-1.el6_10.x86_64.rpm | SHA-256: e317126450e6541f3761fab9feac89023eaf8ce5ca179277dd4e4975d4a78c2c |
chromium-browser-debuginfo-72.0.3626.81-1.el6_10.x86_64.rpm | SHA-256: 822bcc80a55c73d3dae3da2ef9a795dda19ce9749e19f40fa96a1343c0fe7e84 |
i386 | |
chromium-browser-72.0.3626.81-1.el6_10.i686.rpm | SHA-256: a88fe4ce8199f0e4eebbde7930add66fe504d1bbee7641b148ae0014ed0f20de |
chromium-browser-debuginfo-72.0.3626.81-1.el6_10.i686.rpm | SHA-256: e22bffc25c9c048ba0a0aee1ccbb43076667c2d6dd52fe9f306189c9a1aeffd3 |
Red Hat Enterprise Linux Workstation 6
SRPM | |
---|---|
x86_64 | |
chromium-browser-72.0.3626.81-1.el6_10.x86_64.rpm | SHA-256: e317126450e6541f3761fab9feac89023eaf8ce5ca179277dd4e4975d4a78c2c |
chromium-browser-debuginfo-72.0.3626.81-1.el6_10.x86_64.rpm | SHA-256: 822bcc80a55c73d3dae3da2ef9a795dda19ce9749e19f40fa96a1343c0fe7e84 |
i386 | |
chromium-browser-72.0.3626.81-1.el6_10.i686.rpm | SHA-256: a88fe4ce8199f0e4eebbde7930add66fe504d1bbee7641b148ae0014ed0f20de |
chromium-browser-debuginfo-72.0.3626.81-1.el6_10.i686.rpm | SHA-256: e22bffc25c9c048ba0a0aee1ccbb43076667c2d6dd52fe9f306189c9a1aeffd3 |
Red Hat Enterprise Linux Desktop 6
SRPM | |
---|---|
x86_64 | |
chromium-browser-72.0.3626.81-1.el6_10.x86_64.rpm | SHA-256: e317126450e6541f3761fab9feac89023eaf8ce5ca179277dd4e4975d4a78c2c |
chromium-browser-debuginfo-72.0.3626.81-1.el6_10.x86_64.rpm | SHA-256: 822bcc80a55c73d3dae3da2ef9a795dda19ce9749e19f40fa96a1343c0fe7e84 |
i386 | |
chromium-browser-72.0.3626.81-1.el6_10.i686.rpm | SHA-256: a88fe4ce8199f0e4eebbde7930add66fe504d1bbee7641b148ae0014ed0f20de |
chromium-browser-debuginfo-72.0.3626.81-1.el6_10.i686.rpm | SHA-256: e22bffc25c9c048ba0a0aee1ccbb43076667c2d6dd52fe9f306189c9a1aeffd3 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.