RedHat: RHSA-2019-1477:01 Important: chromium-browser security update
Summary
Chromium is an open-source web browser, powered by WebKit (Blink).
This update upgrades Chromium to version 75.0.3770.80.
Security Fix(es):
* chromium-browser: Use after free in ServiceWorker (CVE-2019-5828)
* chromium-browser: Use after free in Download Manager (CVE-2019-5829)
* chromium-browser: Incorrectly credentialed requests in CORS
(CVE-2019-5830)
* chromium-browser: Incorrect map processing in V8 (CVE-2019-5831)
* chromium-browser: Incorrect CORS handling in XHR (CVE-2019-5832)
* chromium-browser: Inconsistent security UI placement (CVE-2019-5833)
* chromium-browser: Out of bounds read in Swiftshader (CVE-2019-5835)
* chromium-browser: Heap buffer overflow in Angle (CVE-2019-5836)
* chromium-browser: Cross-origin resources size disclosure in Appcache
(CVE-2019-5837)
* chromium-browser: Overly permissive tab access in Extensions
(CVE-2019-5838)
* chromium-browser: Incorrect handling of certain code points in Blink
(CVE-2019-5839)
* chromium-browser: Popup blocker bypass (CVE-2019-5840)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Summary
Solution
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing the update, Chromium must be restarted for the changes to
take effect.
References
https://access.redhat.com/security/cve/CVE-2019-5828 https://access.redhat.com/security/cve/CVE-2019-5829 https://access.redhat.com/security/cve/CVE-2019-5830 https://access.redhat.com/security/cve/CVE-2019-5831 https://access.redhat.com/security/cve/CVE-2019-5832 https://access.redhat.com/security/cve/CVE-2019-5833 https://access.redhat.com/security/cve/CVE-2019-5835 https://access.redhat.com/security/cve/CVE-2019-5836 https://access.redhat.com/security/cve/CVE-2019-5837 https://access.redhat.com/security/cve/CVE-2019-5838 https://access.redhat.com/security/cve/CVE-2019-5839 https://access.redhat.com/security/cve/CVE-2019-5840 https://access.redhat.com/security/updates/classification/#important
Package List
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
chromium-browser-75.0.3770.80-1.el6_10.i686.rpm
chromium-browser-debuginfo-75.0.3770.80-1.el6_10.i686.rpm
i686:
chromium-browser-75.0.3770.80-1.el6_10.i686.rpm
chromium-browser-debuginfo-75.0.3770.80-1.el6_10.i686.rpm
x86_64:
chromium-browser-75.0.3770.80-1.el6_10.x86_64.rpm
chromium-browser-debuginfo-75.0.3770.80-1.el6_10.x86_64.rpm
Red Hat Enterprise Linux HPC Node Supplementary (v. 6):
i686:
chromium-browser-75.0.3770.80-1.el6_10.i686.rpm
chromium-browser-debuginfo-75.0.3770.80-1.el6_10.i686.rpm
x86_64:
chromium-browser-75.0.3770.80-1.el6_10.x86_64.rpm
chromium-browser-debuginfo-75.0.3770.80-1.el6_10.x86_64.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
chromium-browser-75.0.3770.80-1.el6_10.i686.rpm
chromium-browser-debuginfo-75.0.3770.80-1.el6_10.i686.rpm
i686:
chromium-browser-75.0.3770.80-1.el6_10.i686.rpm
chromium-browser-debuginfo-75.0.3770.80-1.el6_10.i686.rpm
x86_64:
chromium-browser-75.0.3770.80-1.el6_10.x86_64.rpm
chromium-browser-debuginfo-75.0.3770.80-1.el6_10.x86_64.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
chromium-browser-75.0.3770.80-1.el6_10.i686.rpm
chromium-browser-debuginfo-75.0.3770.80-1.el6_10.i686.rpm
i686:
chromium-browser-75.0.3770.80-1.el6_10.i686.rpm
chromium-browser-debuginfo-75.0.3770.80-1.el6_10.i686.rpm
x86_64:
chromium-browser-75.0.3770.80-1.el6_10.x86_64.rpm
chromium-browser-debuginfo-75.0.3770.80-1.el6_10.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
Topic
An update for chromium-browser is now available for Red Hat EnterpriseLinux 6 Supplementary.Red Hat Product Security has rated this update as having a security impactof Important. A Common Vulnerability Scoring System (CVSS) base score,which gives a detailed severity rating, is available for each vulnerabilityfrom the CVE link(s) in the References section.
Topic
Relevant Releases Architectures
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, i686, x86_64
Red Hat Enterprise Linux HPC Node Supplementary (v. 6) - i686, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, i686, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, i686, x86_64
Bugs Fixed
1718256 - CVE-2019-5828 chromium-browser: Use after free in ServiceWorker
1718257 - CVE-2019-5829 chromium-browser: Use after free in Download Manager
1718258 - CVE-2019-5830 chromium-browser: Incorrectly credentialed requests in CORS
1718259 - CVE-2019-5831 chromium-browser: Incorrect map processing in V8
1718260 - CVE-2019-5832 chromium-browser: Incorrect CORS handling in XHR
1718261 - CVE-2019-5833 chromium-browser: Inconsistent security UI placement
1718263 - CVE-2019-5835 chromium-browser: Out of bounds read in Swiftshader
1718264 - CVE-2019-5836 chromium-browser: Heap buffer overflow in Angle
1718266 - CVE-2019-5837 chromium-browser: Cross-origin resources size disclosure in Appcache
1718267 - CVE-2019-5838 chromium-browser: Overly permissive tab access in Extensions
1718268 - CVE-2019-5839 chromium-browser: Incorrect handling of certain code points in Blink
1718269 - CVE-2019-5840 chromium-browser: Popup blocker bypass