RHEL 6 : chromium-browser (RHSA-2019:4238)

high Nessus Plugin ID 132228

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

An update for chromium-browser is now available for Red Hat Enterprise Linux 6 Supplementary.

Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Chromium is an open source web browser, powered by WebKit (Blink).

This update upgrades Chromium to version 79.0.3945.79.

Security Fix(es) :

* chromium-browser: Use after free in Bluetooth (CVE-2019-13725)

* chromium-browser: Heap buffer overflow in password manager (CVE-2019-13726)

* chromium-browser: Insufficient policy enforcement in WebSockets (CVE-2019-13727)

* chromium-browser: Out of bounds write in V8 (CVE-2019-13728)

* chromium-browser: Use after free in WebSockets (CVE-2019-13729)

* chromium-browser: Type Confusion in V8 (CVE-2019-13730)

* chromium-browser: Use after free in WebAudio (CVE-2019-13732)

* chromium-browser: Out of bounds write in SQLite (CVE-2019-13734)

* chromium-browser: Out of bounds write in V8 (CVE-2019-13735)

* chromium-browser: Type Confusion in V8 (CVE-2019-13764)

* chromium-browser: Integer overflow in PDFium (CVE-2019-13736)

* chromium-browser: Insufficient policy enforcement in autocomplete (CVE-2019-13737)

* chromium-browser: Insufficient policy enforcement in navigation (CVE-2019-13738)

* chromium-browser: Incorrect security UI in Omnibox (CVE-2019-13739)

* chromium-browser: Incorrect security UI in sharing (CVE-2019-13740)

* chromium-browser: Insufficient validation of untrusted input in Blink (CVE-2019-13741)

* chromium-browser: Incorrect security UI in Omnibox (CVE-2019-13742)

* chromium-browser: Incorrect security UI in external protocol handling (CVE-2019-13743)

* chromium-browser: Insufficient policy enforcement in cookies (CVE-2019-13744)

* chromium-browser: Insufficient policy enforcement in audio (CVE-2019-13745)

* chromium-browser: Insufficient policy enforcement in Omnibox (CVE-2019-13746)

* chromium-browser: Uninitialized Use in rendering (CVE-2019-13747)

* chromium-browser: Insufficient policy enforcement in developer tools (CVE-2019-13748)

* chromium-browser: Incorrect security UI in Omnibox (CVE-2019-13749)

* chromium-browser: Insufficient data validation in SQLite (CVE-2019-13750)

* chromium-browser: Uninitialized Use in SQLite (CVE-2019-13751)

* chromium-browser: Out of bounds read in SQLite (CVE-2019-13752)

* chromium-browser: Out of bounds read in SQLite (CVE-2019-13753)

* chromium-browser: Insufficient policy enforcement in extensions (CVE-2019-13754)

* chromium-browser: Insufficient policy enforcement in extensions (CVE-2019-13755)

* chromium-browser: Incorrect security UI in printing (CVE-2019-13756)

* chromium-browser: Incorrect security UI in Omnibox (CVE-2019-13757)

* chromium-browser: Insufficient policy enforcement in navigation (CVE-2019-13758)

* chromium-browser: Incorrect security UI in interstitials (CVE-2019-13759)

* chromium-browser: Incorrect security UI in Omnibox (CVE-2019-13761)

* chromium-browser: Insufficient policy enforcement in downloads (CVE-2019-13762)

* chromium-browser: Insufficient policy enforcement in payments (CVE-2019-13763)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

Update the affected chromium-browser and / or chromium-browser-debuginfo packages.

See Also

https://access.redhat.com/errata/RHSA-2019:4238

https://access.redhat.com/security/cve/cve-2019-13725

https://access.redhat.com/security/cve/cve-2019-13726

https://access.redhat.com/security/cve/cve-2019-13727

https://access.redhat.com/security/cve/cve-2019-13728

https://access.redhat.com/security/cve/cve-2019-13729

https://access.redhat.com/security/cve/cve-2019-13730

https://access.redhat.com/security/cve/cve-2019-13732

https://access.redhat.com/security/cve/cve-2019-13734

https://access.redhat.com/security/cve/cve-2019-13735

https://access.redhat.com/security/cve/cve-2019-13736

https://access.redhat.com/security/cve/cve-2019-13737

https://access.redhat.com/security/cve/cve-2019-13738

https://access.redhat.com/security/cve/cve-2019-13739

https://access.redhat.com/security/cve/cve-2019-13740

https://access.redhat.com/security/cve/cve-2019-13741

https://access.redhat.com/security/cve/cve-2019-13742

https://access.redhat.com/security/cve/cve-2019-13743

https://access.redhat.com/security/cve/cve-2019-13744

https://access.redhat.com/security/cve/cve-2019-13745

https://access.redhat.com/security/cve/cve-2019-13746

https://access.redhat.com/security/cve/cve-2019-13747

https://access.redhat.com/security/cve/cve-2019-13748

https://access.redhat.com/security/cve/cve-2019-13749

https://access.redhat.com/security/cve/cve-2019-13750

https://access.redhat.com/security/cve/cve-2019-13751

https://access.redhat.com/security/cve/cve-2019-13752

https://access.redhat.com/security/cve/cve-2019-13753

https://access.redhat.com/security/cve/cve-2019-13754

https://access.redhat.com/security/cve/cve-2019-13755

https://access.redhat.com/security/cve/cve-2019-13756

https://access.redhat.com/security/cve/cve-2019-13757

https://access.redhat.com/security/cve/cve-2019-13758

https://access.redhat.com/security/cve/cve-2019-13759

https://access.redhat.com/security/cve/cve-2019-13761

https://access.redhat.com/security/cve/cve-2019-13762

https://access.redhat.com/security/cve/cve-2019-13763

https://access.redhat.com/security/cve/cve-2019-13764

Plugin Details

Severity: High

ID: 132228

File Name: redhat-RHSA-2019-4238.nasl

Version: 1.3

Type: local

Agent: unix

Published: 12/18/2019

Updated: 5/29/2020

Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.4

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:chromium-browser, p-cpe:/a:redhat:enterprise_linux:chromium-browser-debuginfo, cpe:/o:redhat:enterprise_linux:6

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 12/16/2019

Vulnerability Publication Date: 12/10/2019

Reference Information

CVE: CVE-2019-13725, CVE-2019-13726, CVE-2019-13727, CVE-2019-13728, CVE-2019-13729, CVE-2019-13730, CVE-2019-13732, CVE-2019-13734, CVE-2019-13735, CVE-2019-13736, CVE-2019-13737, CVE-2019-13738, CVE-2019-13739, CVE-2019-13740, CVE-2019-13741, CVE-2019-13742, CVE-2019-13743, CVE-2019-13744, CVE-2019-13745, CVE-2019-13746, CVE-2019-13747, CVE-2019-13748, CVE-2019-13749, CVE-2019-13750, CVE-2019-13751, CVE-2019-13752, CVE-2019-13753, CVE-2019-13754, CVE-2019-13755, CVE-2019-13756, CVE-2019-13757, CVE-2019-13758, CVE-2019-13759, CVE-2019-13761, CVE-2019-13762, CVE-2019-13763, CVE-2019-13764

RHSA: 2019:4238