RHSA-2017_1124

Vulnerability from csaf_redhat - Published: 2017-04-25 08:46 - Updated: 2024-11-14 22:39
Summary
Red Hat Security Advisory: chromium-browser security update
Severity
Important
Notes
Topic: An update for chromium-browser is now available for Red Hat Enterprise Linux 6 Supplementary. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details: Chromium is an open-source web browser, powered by WebKit (Blink). This update upgrades Chromium to version 58.0.3029.81. Security Fix(es): * Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash, execute arbitrary code, or disclose sensitive information when visited by the victim. (CVE-2017-5057, CVE-2017-5058, CVE-2017-5059, CVE-2017-5060, CVE-2017-5061, CVE-2017-5062, CVE-2017-5063, CVE-2017-5064, CVE-2017-5065, CVE-2017-5066, CVE-2017-5067, CVE-2017-5069)
Terms of Use: This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Type confusion in PDFium in Google Chrome prior to 58.0.3029.81 for Mac, Windows, and Linux, and 58.0.3029.83 for Android, allowed a remote attacker to perform an out of bounds memory read via a crafted PDF file.

Affected products
Product Identifier Version Remediation
Unresolved product id: 6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Unresolved product id: 6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Unresolved product id: 6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Unresolved product id: 6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Unresolved product id: 6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Unresolved product id: 6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Threats
Impact Important

A use after free in PrintPreview in Google Chrome prior to 58.0.3029.81 for Windows allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.

Affected products
Product Identifier Version Remediation
Unresolved product id: 6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Unresolved product id: 6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Unresolved product id: 6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Unresolved product id: 6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Unresolved product id: 6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Unresolved product id: 6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Threats
Impact Important

Type confusion in Blink in Google Chrome prior to 58.0.3029.81 for Linux, Windows, and Mac, and 58.0.3029.83 for Android, allowed a remote attacker to potentially obtain code execution via a crafted HTML page.

Affected products
Product Identifier Version Remediation
Unresolved product id: 6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Unresolved product id: 6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Unresolved product id: 6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Unresolved product id: 6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Unresolved product id: 6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Unresolved product id: 6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Threats
Impact Important

Insufficient Policy Enforcement in Omnibox in Google Chrome prior to 58.0.3029.81 for Mac, Windows, and Linux, and 58.0.3029.83 for Android, allowed a remote attacker to perform domain spoofing via IDN homographs in a crafted domain name.

Affected products
Product Identifier Version Remediation
Unresolved product id: 6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Unresolved product id: 6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Unresolved product id: 6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Unresolved product id: 6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Unresolved product id: 6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Unresolved product id: 6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Threats
Impact Moderate

A race condition in navigation in Google Chrome prior to 58.0.3029.81 for Linux, Windows, and Mac allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.

Affected products
Product Identifier Version Remediation
Unresolved product id: 6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Unresolved product id: 6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Unresolved product id: 6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Unresolved product id: 6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Unresolved product id: 6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Unresolved product id: 6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Threats
Impact Moderate

A use after free in Chrome Apps in Google Chrome prior to 58.0.3029.81 for Mac, Windows, and Linux, and 58.0.3029.83 for Android, allowed a remote attacker to potentially perform out of bounds memory access via a crafted Chrome extension.

Affected products
Product Identifier Version Remediation
Unresolved product id: 6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Unresolved product id: 6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Unresolved product id: 6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Unresolved product id: 6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Unresolved product id: 6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Unresolved product id: 6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Threats
Impact Moderate

A numeric overflow in Skia in Google Chrome prior to 58.0.3029.81 for Linux, Windows, and Mac, and 58.0.3029.83 for Android, allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.

Affected products
Product Identifier Version Remediation
Unresolved product id: 6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Unresolved product id: 6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Unresolved product id: 6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Unresolved product id: 6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Unresolved product id: 6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Unresolved product id: 6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Threats
Impact Moderate

Incorrect handling of DOM changes in Blink in Google Chrome prior to 58.0.3029.81 for Windows allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

Affected products
Product Identifier Version Remediation
Unresolved product id: 6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Unresolved product id: 6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Unresolved product id: 6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Unresolved product id: 6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Unresolved product id: 6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Unresolved product id: 6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Threats
Impact Moderate

Lack of an appropriate action on page navigation in Blink in Google Chrome prior to 58.0.3029.81 for Windows and Mac allowed a remote attacker to potentially confuse a user into making an incorrect security decision via a crafted HTML page.

Affected products
Product Identifier Version Remediation
Unresolved product id: 6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Unresolved product id: 6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Unresolved product id: 6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Unresolved product id: 6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Unresolved product id: 6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Unresolved product id: 6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Threats
Impact Moderate

Insufficient consistency checks in signature handling in the networking stack in Google Chrome prior to 58.0.3029.81 for Mac, Windows, and Linux, and 58.0.3029.83 for Android, allowed a remote attacker to incorrectly accept a badly formed X.509 certificate via a crafted HTML page.

Affected products
Product Identifier Version Remediation
Unresolved product id: 6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Unresolved product id: 6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Unresolved product id: 6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Unresolved product id: 6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Unresolved product id: 6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Unresolved product id: 6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Threats
Impact Moderate

An insufficient watchdog timer in navigation in Google Chrome prior to 58.0.3029.81 for Linux, Windows, and Mac allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.

Affected products
Product Identifier Version Remediation
Unresolved product id: 6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Unresolved product id: 6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Unresolved product id: 6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Unresolved product id: 6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Unresolved product id: 6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Unresolved product id: 6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Threats
Impact Moderate

Incorrect MIME type of XSS-Protection reports in Blink in Google Chrome prior to 58.0.3029.81 for Linux, Windows, and Mac, and 58.0.3029.83 for Android, allowed a remote attacker to circumvent Cross-Origin Resource Sharing checks via a crafted HTML page.

Affected products
Product Identifier Version Remediation
Unresolved product id: 6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Unresolved product id: 6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Unresolved product id: 6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Unresolved product id: 6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Unresolved product id: 6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Unresolved product id: 6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686
Vendor Fix fix
Unresolved product id: 6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64
Vendor Fix fix
Threats
Impact Low
References
URL Category
https://access.redhat.com/errata/RHSA-2017:1124 self
https://access.redhat.com/security/updates/classi… external
https://chromereleases.googleblog.com/2017/04/sta… external
https://bugzilla.redhat.com/show_bug.cgi?id=1443835 external
https://bugzilla.redhat.com/show_bug.cgi?id=1443836 external
https://bugzilla.redhat.com/show_bug.cgi?id=1443837 external
https://bugzilla.redhat.com/show_bug.cgi?id=1443838 external
https://bugzilla.redhat.com/show_bug.cgi?id=1443839 external
https://bugzilla.redhat.com/show_bug.cgi?id=1443840 external
https://bugzilla.redhat.com/show_bug.cgi?id=1443841 external
https://bugzilla.redhat.com/show_bug.cgi?id=1443845 external
https://bugzilla.redhat.com/show_bug.cgi?id=1443847 external
https://bugzilla.redhat.com/show_bug.cgi?id=1443848 external
https://bugzilla.redhat.com/show_bug.cgi?id=1443849 external
https://bugzilla.redhat.com/show_bug.cgi?id=1443850 external
https://security.access.redhat.com/data/csaf/v2/a… self
https://access.redhat.com/security/cve/CVE-2017-5057 self
https://bugzilla.redhat.com/show_bug.cgi?id=1443835 external
https://www.cve.org/CVERecord?id=CVE-2017-5057 external
https://nvd.nist.gov/vuln/detail/CVE-2017-5057 external
https://chromereleases.googleblog.com/2017/04/sta… external
https://access.redhat.com/security/cve/CVE-2017-5058 self
https://bugzilla.redhat.com/show_bug.cgi?id=1443836 external
https://www.cve.org/CVERecord?id=CVE-2017-5058 external
https://nvd.nist.gov/vuln/detail/CVE-2017-5058 external
https://access.redhat.com/security/cve/CVE-2017-5059 self
https://bugzilla.redhat.com/show_bug.cgi?id=1443837 external
https://www.cve.org/CVERecord?id=CVE-2017-5059 external
https://nvd.nist.gov/vuln/detail/CVE-2017-5059 external
https://access.redhat.com/security/cve/CVE-2017-5060 self
https://bugzilla.redhat.com/show_bug.cgi?id=1443838 external
https://www.cve.org/CVERecord?id=CVE-2017-5060 external
https://nvd.nist.gov/vuln/detail/CVE-2017-5060 external
https://access.redhat.com/security/cve/CVE-2017-5061 self
https://bugzilla.redhat.com/show_bug.cgi?id=1443839 external
https://www.cve.org/CVERecord?id=CVE-2017-5061 external
https://nvd.nist.gov/vuln/detail/CVE-2017-5061 external
https://access.redhat.com/security/cve/CVE-2017-5062 self
https://bugzilla.redhat.com/show_bug.cgi?id=1443840 external
https://www.cve.org/CVERecord?id=CVE-2017-5062 external
https://nvd.nist.gov/vuln/detail/CVE-2017-5062 external
https://access.redhat.com/security/cve/CVE-2017-5063 self
https://bugzilla.redhat.com/show_bug.cgi?id=1443841 external
https://www.cve.org/CVERecord?id=CVE-2017-5063 external
https://nvd.nist.gov/vuln/detail/CVE-2017-5063 external
https://access.redhat.com/security/cve/CVE-2017-5064 self
https://bugzilla.redhat.com/show_bug.cgi?id=1443845 external
https://www.cve.org/CVERecord?id=CVE-2017-5064 external
https://nvd.nist.gov/vuln/detail/CVE-2017-5064 external
https://access.redhat.com/security/cve/CVE-2017-5065 self
https://bugzilla.redhat.com/show_bug.cgi?id=1443847 external
https://www.cve.org/CVERecord?id=CVE-2017-5065 external
https://nvd.nist.gov/vuln/detail/CVE-2017-5065 external
https://access.redhat.com/security/cve/CVE-2017-5066 self
https://bugzilla.redhat.com/show_bug.cgi?id=1443848 external
https://www.cve.org/CVERecord?id=CVE-2017-5066 external
https://nvd.nist.gov/vuln/detail/CVE-2017-5066 external
https://access.redhat.com/security/cve/CVE-2017-5067 self
https://bugzilla.redhat.com/show_bug.cgi?id=1443849 external
https://www.cve.org/CVERecord?id=CVE-2017-5067 external
https://nvd.nist.gov/vuln/detail/CVE-2017-5067 external
https://access.redhat.com/security/cve/CVE-2017-5069 self
https://bugzilla.redhat.com/show_bug.cgi?id=1443850 external
https://www.cve.org/CVERecord?id=CVE-2017-5069 external
https://nvd.nist.gov/vuln/detail/CVE-2017-5069 external

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for chromium-browser is now available for Red Hat Enterprise Linux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Chromium is an open-source web browser, powered by WebKit (Blink).\n\nThis update upgrades Chromium to version 58.0.3029.81.\n\nSecurity Fix(es):\n\n* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash, execute arbitrary code, or disclose sensitive information when visited by the victim. (CVE-2017-5057, CVE-2017-5058, CVE-2017-5059, CVE-2017-5060, CVE-2017-5061, CVE-2017-5062, CVE-2017-5063, CVE-2017-5064, CVE-2017-5065, CVE-2017-5066, CVE-2017-5067, CVE-2017-5069)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2017:1124",
        "url": "https://access.redhat.com/errata/RHSA-2017:1124"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://chromereleases.googleblog.com/2017/04/stable-channel-update-for-desktop.html",
        "url": "https://chromereleases.googleblog.com/2017/04/stable-channel-update-for-desktop.html"
      },
      {
        "category": "external",
        "summary": "1443835",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443835"
      },
      {
        "category": "external",
        "summary": "1443836",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443836"
      },
      {
        "category": "external",
        "summary": "1443837",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443837"
      },
      {
        "category": "external",
        "summary": "1443838",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443838"
      },
      {
        "category": "external",
        "summary": "1443839",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443839"
      },
      {
        "category": "external",
        "summary": "1443840",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443840"
      },
      {
        "category": "external",
        "summary": "1443841",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443841"
      },
      {
        "category": "external",
        "summary": "1443845",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443845"
      },
      {
        "category": "external",
        "summary": "1443847",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443847"
      },
      {
        "category": "external",
        "summary": "1443848",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443848"
      },
      {
        "category": "external",
        "summary": "1443849",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443849"
      },
      {
        "category": "external",
        "summary": "1443850",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443850"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_1124.json"
      }
    ],
    "title": "Red Hat Security Advisory: chromium-browser security update",
    "tracking": {
      "current_release_date": "2024-11-14T22:39:55+00:00",
      "generator": {
        "date": "2024-11-14T22:39:55+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2017:1124",
      "initial_release_date": "2017-04-25T08:46:49+00:00",
      "revision_history": [
        {
          "date": "2017-04-25T08:46:49+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2017-04-25T08:46:49+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-14T22:39:55+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
                  "product_id": "6Client-Supplementary-6.9.z",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_extras:6"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)",
                  "product_id": "6Server-Supplementary-6.9.z",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_extras:6"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
                  "product_id": "6Workstation-Supplementary-6.9.z",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_extras:6"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux Supplementary"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
                "product": {
                  "name": "chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
                  "product_id": "chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/chromium-browser-debuginfo@58.0.3029.81-1.el6_9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
                "product": {
                  "name": "chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
                  "product_id": "chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/chromium-browser@58.0.3029.81-1.el6_9?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
                "product": {
                  "name": "chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
                  "product_id": "chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/chromium-browser-debuginfo@58.0.3029.81-1.el6_9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "chromium-browser-0:58.0.3029.81-1.el6_9.i686",
                "product": {
                  "name": "chromium-browser-0:58.0.3029.81-1.el6_9.i686",
                  "product_id": "chromium-browser-0:58.0.3029.81-1.el6_9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/chromium-browser@58.0.3029.81-1.el6_9?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "chromium-browser-0:58.0.3029.81-1.el6_9.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
          "product_id": "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686"
        },
        "product_reference": "chromium-browser-0:58.0.3029.81-1.el6_9.i686",
        "relates_to_product_reference": "6Client-Supplementary-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "chromium-browser-0:58.0.3029.81-1.el6_9.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
          "product_id": "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64"
        },
        "product_reference": "chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
        "relates_to_product_reference": "6Client-Supplementary-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
          "product_id": "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686"
        },
        "product_reference": "chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
        "relates_to_product_reference": "6Client-Supplementary-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
          "product_id": "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64"
        },
        "product_reference": "chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
        "relates_to_product_reference": "6Client-Supplementary-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "chromium-browser-0:58.0.3029.81-1.el6_9.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
          "product_id": "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686"
        },
        "product_reference": "chromium-browser-0:58.0.3029.81-1.el6_9.i686",
        "relates_to_product_reference": "6Server-Supplementary-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "chromium-browser-0:58.0.3029.81-1.el6_9.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
          "product_id": "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64"
        },
        "product_reference": "chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
        "relates_to_product_reference": "6Server-Supplementary-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
          "product_id": "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686"
        },
        "product_reference": "chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
        "relates_to_product_reference": "6Server-Supplementary-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
          "product_id": "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64"
        },
        "product_reference": "chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
        "relates_to_product_reference": "6Server-Supplementary-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "chromium-browser-0:58.0.3029.81-1.el6_9.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
          "product_id": "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686"
        },
        "product_reference": "chromium-browser-0:58.0.3029.81-1.el6_9.i686",
        "relates_to_product_reference": "6Workstation-Supplementary-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "chromium-browser-0:58.0.3029.81-1.el6_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
          "product_id": "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64"
        },
        "product_reference": "chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
        "relates_to_product_reference": "6Workstation-Supplementary-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
          "product_id": "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686"
        },
        "product_reference": "chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
        "relates_to_product_reference": "6Workstation-Supplementary-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
          "product_id": "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64"
        },
        "product_reference": "chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
        "relates_to_product_reference": "6Workstation-Supplementary-6.9.z"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2017-5057",
      "discovery_date": "2017-04-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1443835"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Type confusion in PDFium in Google Chrome prior to 58.0.3029.81 for Mac, Windows, and Linux, and 58.0.3029.83 for Android, allowed a remote attacker to perform an out of bounds memory read via a crafted PDF file.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "chromium-browser: type confusion in pdfium",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
          "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
          "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
          "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
          "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
          "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
          "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
          "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
          "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
          "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
          "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
          "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-5057"
        },
        {
          "category": "external",
          "summary": "RHBZ#1443835",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443835"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5057",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-5057"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5057",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5057"
        },
        {
          "category": "external",
          "summary": "https://chromereleases.googleblog.com/2017/04/stable-channel-update-for-desktop.html",
          "url": "https://chromereleases.googleblog.com/2017/04/stable-channel-update-for-desktop.html"
        }
      ],
      "release_date": "2017-04-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-04-25T08:46:49+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.",
          "product_ids": [
            "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
            "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
            "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:1124"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
            "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
            "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "chromium-browser: type confusion in pdfium"
    },
    {
      "cve": "CVE-2017-5058",
      "discovery_date": "2017-04-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1443836"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use after free in PrintPreview in Google Chrome prior to 58.0.3029.81 for Windows allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "chromium-browser: heap use after free in print preview",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
          "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
          "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
          "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
          "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
          "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
          "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
          "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
          "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
          "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
          "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
          "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-5058"
        },
        {
          "category": "external",
          "summary": "RHBZ#1443836",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443836"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5058",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-5058"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5058",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5058"
        },
        {
          "category": "external",
          "summary": "https://chromereleases.googleblog.com/2017/04/stable-channel-update-for-desktop.html",
          "url": "https://chromereleases.googleblog.com/2017/04/stable-channel-update-for-desktop.html"
        }
      ],
      "release_date": "2017-04-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-04-25T08:46:49+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.",
          "product_ids": [
            "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
            "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
            "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:1124"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
            "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
            "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "chromium-browser: heap use after free in print preview"
    },
    {
      "cve": "CVE-2017-5059",
      "discovery_date": "2017-04-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1443837"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Type confusion in Blink in Google Chrome prior to 58.0.3029.81 for Linux, Windows, and Mac, and 58.0.3029.83 for Android, allowed a remote attacker to potentially obtain code execution via a crafted HTML page.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "chromium-browser: type confusion in blink",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
          "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
          "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
          "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
          "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
          "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
          "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
          "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
          "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
          "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
          "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
          "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-5059"
        },
        {
          "category": "external",
          "summary": "RHBZ#1443837",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443837"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5059",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-5059"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5059",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5059"
        },
        {
          "category": "external",
          "summary": "https://chromereleases.googleblog.com/2017/04/stable-channel-update-for-desktop.html",
          "url": "https://chromereleases.googleblog.com/2017/04/stable-channel-update-for-desktop.html"
        }
      ],
      "release_date": "2017-04-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-04-25T08:46:49+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.",
          "product_ids": [
            "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
            "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
            "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:1124"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
            "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
            "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "chromium-browser: type confusion in blink"
    },
    {
      "cve": "CVE-2017-5060",
      "discovery_date": "2017-04-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1443838"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Insufficient Policy Enforcement in Omnibox in Google Chrome prior to 58.0.3029.81 for Mac, Windows, and Linux, and 58.0.3029.83 for Android, allowed a remote attacker to perform domain spoofing via IDN homographs in a crafted domain name.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "chromium-browser: url spoofing in omnibox",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
          "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
          "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
          "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
          "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
          "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
          "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
          "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
          "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
          "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
          "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
          "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-5060"
        },
        {
          "category": "external",
          "summary": "RHBZ#1443838",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443838"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5060",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-5060"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5060",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5060"
        },
        {
          "category": "external",
          "summary": "https://chromereleases.googleblog.com/2017/04/stable-channel-update-for-desktop.html",
          "url": "https://chromereleases.googleblog.com/2017/04/stable-channel-update-for-desktop.html"
        }
      ],
      "release_date": "2017-04-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-04-25T08:46:49+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.",
          "product_ids": [
            "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
            "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
            "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:1124"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
            "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
            "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "chromium-browser: url spoofing in omnibox"
    },
    {
      "cve": "CVE-2017-5061",
      "discovery_date": "2017-04-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1443839"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A race condition in navigation in Google Chrome prior to 58.0.3029.81 for Linux, Windows, and Mac allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "chromium-browser: url spoofing in omnibox",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
          "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
          "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
          "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
          "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
          "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
          "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
          "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
          "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
          "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
          "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
          "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-5061"
        },
        {
          "category": "external",
          "summary": "RHBZ#1443839",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443839"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5061",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-5061"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5061",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5061"
        },
        {
          "category": "external",
          "summary": "https://chromereleases.googleblog.com/2017/04/stable-channel-update-for-desktop.html",
          "url": "https://chromereleases.googleblog.com/2017/04/stable-channel-update-for-desktop.html"
        }
      ],
      "release_date": "2017-04-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-04-25T08:46:49+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.",
          "product_ids": [
            "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
            "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
            "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:1124"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
            "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
            "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "chromium-browser: url spoofing in omnibox"
    },
    {
      "cve": "CVE-2017-5062",
      "discovery_date": "2017-04-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1443840"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use after free in Chrome Apps in Google Chrome prior to 58.0.3029.81 for Mac, Windows, and Linux, and 58.0.3029.83 for Android, allowed a remote attacker to potentially perform out of bounds memory access via a crafted Chrome extension.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "chromium-browser: use after free in chrome apps",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
          "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
          "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
          "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
          "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
          "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
          "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
          "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
          "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
          "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
          "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
          "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-5062"
        },
        {
          "category": "external",
          "summary": "RHBZ#1443840",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443840"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5062",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-5062"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5062",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5062"
        },
        {
          "category": "external",
          "summary": "https://chromereleases.googleblog.com/2017/04/stable-channel-update-for-desktop.html",
          "url": "https://chromereleases.googleblog.com/2017/04/stable-channel-update-for-desktop.html"
        }
      ],
      "release_date": "2017-04-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-04-25T08:46:49+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.",
          "product_ids": [
            "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
            "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
            "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:1124"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
            "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
            "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "chromium-browser: use after free in chrome apps"
    },
    {
      "cve": "CVE-2017-5063",
      "discovery_date": "2017-04-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1443841"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A numeric overflow in Skia in Google Chrome prior to 58.0.3029.81 for Linux, Windows, and Mac, and 58.0.3029.83 for Android, allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "chromium-browser: heap overflow in skia",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
          "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
          "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
          "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
          "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
          "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
          "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
          "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
          "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
          "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
          "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
          "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-5063"
        },
        {
          "category": "external",
          "summary": "RHBZ#1443841",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443841"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5063",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-5063"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5063",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5063"
        },
        {
          "category": "external",
          "summary": "https://chromereleases.googleblog.com/2017/04/stable-channel-update-for-desktop.html",
          "url": "https://chromereleases.googleblog.com/2017/04/stable-channel-update-for-desktop.html"
        }
      ],
      "release_date": "2017-04-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-04-25T08:46:49+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.",
          "product_ids": [
            "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
            "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
            "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:1124"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
            "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
            "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "chromium-browser: heap overflow in skia"
    },
    {
      "cve": "CVE-2017-5064",
      "discovery_date": "2017-04-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1443845"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Incorrect handling of DOM changes in Blink in Google Chrome prior to 58.0.3029.81 for Windows allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "chromium-browser: use after free in blink",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
          "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
          "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
          "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
          "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
          "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
          "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
          "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
          "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
          "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
          "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
          "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-5064"
        },
        {
          "category": "external",
          "summary": "RHBZ#1443845",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443845"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5064",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-5064"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5064",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5064"
        },
        {
          "category": "external",
          "summary": "https://chromereleases.googleblog.com/2017/04/stable-channel-update-for-desktop.html",
          "url": "https://chromereleases.googleblog.com/2017/04/stable-channel-update-for-desktop.html"
        }
      ],
      "release_date": "2017-04-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-04-25T08:46:49+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.",
          "product_ids": [
            "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
            "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
            "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:1124"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
            "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
            "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "chromium-browser: use after free in blink"
    },
    {
      "cve": "CVE-2017-5065",
      "discovery_date": "2017-04-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1443847"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Lack of an appropriate action on page navigation in Blink in Google Chrome prior to 58.0.3029.81 for Windows and Mac allowed a remote attacker to potentially confuse a user into making an incorrect security decision via a crafted HTML page.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "chromium-browser: incorrect ui in blink",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
          "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
          "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
          "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
          "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
          "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
          "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
          "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
          "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
          "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
          "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
          "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-5065"
        },
        {
          "category": "external",
          "summary": "RHBZ#1443847",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443847"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5065",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-5065"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5065",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5065"
        },
        {
          "category": "external",
          "summary": "https://chromereleases.googleblog.com/2017/04/stable-channel-update-for-desktop.html",
          "url": "https://chromereleases.googleblog.com/2017/04/stable-channel-update-for-desktop.html"
        }
      ],
      "release_date": "2017-04-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-04-25T08:46:49+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.",
          "product_ids": [
            "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
            "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
            "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:1124"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
            "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
            "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "chromium-browser: incorrect ui in blink"
    },
    {
      "cve": "CVE-2017-5066",
      "discovery_date": "2017-04-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1443848"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Insufficient consistency checks in signature handling in the networking stack in Google Chrome prior to 58.0.3029.81 for Mac, Windows, and Linux, and 58.0.3029.83 for Android, allowed a remote attacker to incorrectly accept a badly formed X.509 certificate via a crafted HTML page.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "chromium-browser: incorrect signature handing in networking",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
          "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
          "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
          "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
          "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
          "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
          "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
          "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
          "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
          "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
          "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
          "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-5066"
        },
        {
          "category": "external",
          "summary": "RHBZ#1443848",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443848"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5066",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-5066"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5066",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5066"
        },
        {
          "category": "external",
          "summary": "https://chromereleases.googleblog.com/2017/04/stable-channel-update-for-desktop.html",
          "url": "https://chromereleases.googleblog.com/2017/04/stable-channel-update-for-desktop.html"
        }
      ],
      "release_date": "2017-04-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-04-25T08:46:49+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.",
          "product_ids": [
            "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
            "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
            "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:1124"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
            "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
            "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "chromium-browser: incorrect signature handing in networking"
    },
    {
      "cve": "CVE-2017-5067",
      "discovery_date": "2017-04-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1443849"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An insufficient watchdog timer in navigation in Google Chrome prior to 58.0.3029.81 for Linux, Windows, and Mac allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "chromium-browser: url spoofing in omnibox",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
          "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
          "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
          "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
          "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
          "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
          "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
          "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
          "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
          "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
          "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
          "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-5067"
        },
        {
          "category": "external",
          "summary": "RHBZ#1443849",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443849"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5067",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-5067"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5067",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5067"
        },
        {
          "category": "external",
          "summary": "https://chromereleases.googleblog.com/2017/04/stable-channel-update-for-desktop.html",
          "url": "https://chromereleases.googleblog.com/2017/04/stable-channel-update-for-desktop.html"
        }
      ],
      "release_date": "2017-04-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-04-25T08:46:49+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.",
          "product_ids": [
            "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
            "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
            "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:1124"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
            "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
            "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "chromium-browser: url spoofing in omnibox"
    },
    {
      "cve": "CVE-2017-5069",
      "discovery_date": "2017-04-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1443850"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Incorrect MIME type of XSS-Protection reports in Blink in Google Chrome prior to 58.0.3029.81 for Linux, Windows, and Mac, and 58.0.3029.83 for Android, allowed a remote attacker to circumvent Cross-Origin Resource Sharing checks via a crafted HTML page.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "chromium-browser: cross-origin bypass in blink",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
          "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
          "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
          "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
          "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
          "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
          "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
          "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
          "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
          "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
          "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
          "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-5069"
        },
        {
          "category": "external",
          "summary": "RHBZ#1443850",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443850"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5069",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-5069"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5069",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5069"
        },
        {
          "category": "external",
          "summary": "https://chromereleases.googleblog.com/2017/04/stable-channel-update-for-desktop.html",
          "url": "https://chromereleases.googleblog.com/2017/04/stable-channel-update-for-desktop.html"
        }
      ],
      "release_date": "2017-04-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-04-25T08:46:49+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.",
          "product_ids": [
            "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
            "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
            "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:1124"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.2,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
            "version": "3.0"
          },
          "products": [
            "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Client-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Client-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
            "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Server-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Server-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64",
            "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.i686",
            "6Workstation-Supplementary-6.9.z:chromium-browser-0:58.0.3029.81-1.el6_9.x86_64",
            "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.i686",
            "6Workstation-Supplementary-6.9.z:chromium-browser-debuginfo-0:58.0.3029.81-1.el6_9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "chromium-browser: cross-origin bypass in blink"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.

Sightings

Author Source Type Date Other

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…