[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249966

 
 

909

 
 

195636

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

RHSA-2019:3211-01 -- Redhat chromium-browser, chromium-browser-debuginfo

ID: oval:org.secpod.oval:def:505513Date: (C)2020-12-31   (M)2024-02-19
Class: PATCHFamily: unix




Chromium is an open-source web browser, powered by WebKit . This update upgrades Chromium to version 77.0.3865.120. Security Fix: * chromium-browser: Use-after-free in media * chromium-browser: Heap overflow in Skia * chromium-browser: Use-after-free in Mojo * chromium-browser: External URIs may trigger other browsers * chromium-browser: URL bar spoof via download redirect * chromium-browser: Use-after-free in media * chromium-browser: Out-of-bounds access in V8 * chromium-browser: Use-after-free in V8 * chromium-browser: Use-after-free in offline pages * chromium-browser: Use-after-free in media * chromium-browser: Omnibox spoof * chromium-browser: SOP bypass * chromium-browser: Use-after-free in IndexedDB * chromium-browser: Use-after-free in WebRTC * chromium-browser: Use-after-free in audio * chromium-browser: Use-after-free in V8 * chromium-browser: Cross-origin size leak * chromium-browser: Extensions can read some local files * chromium-browser: SameSite cookie bypass * chromium-browser: Arbitrary read in SwiftShader * chromium-browser: URL spoof * chromium-browser: Full screen notification overlap * chromium-browser: Full screen notification spoof * chromium-browser: CSP bypass * chromium-browser: IDN spoof * chromium-browser: CSRF bypass * chromium-browser: Multiple file download protection bypass * chromium-browser: Side channel using storage size estimate * chromium-browser: URI bar spoof when using external app URIs * chromium-browser: Global window leak via console * chromium-browser: HTTP authentication spoof * chromium-browser: V8 memory corruption in regex * chromium-browser: Dialog box fails to show origin * chromium-browser: Cross-origin information leak using devtools * chromium-browser: IDN spoofing * chromium-browser: Extensions can be disabled by trailing slash * chromium-browser: Google URI shown for certificate warning * chromium-browser: Chrome web store origin needs to be isolated * chromium-browser: Download dialog spoofing * chromium-browser: User gesture needed for printing * chromium-browser: IP address spoofing to servers * chromium-browser: Bypass on download restrictions * chromium-browser: Site isolation bypass For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section.

Platform:
Red Hat Enterprise Linux 6
Product:
chromium-browser
chromium-browser-debuginfo
Reference:
RHSA-2019:3211-01
CVE-2019-5870
CVE-2019-5871
CVE-2019-5872
CVE-2019-5874
CVE-2019-5875
CVE-2019-5876
CVE-2019-5877
CVE-2019-5878
CVE-2019-5879
CVE-2019-5880
CVE-2019-5881
CVE-2019-13659
CVE-2019-13660
CVE-2019-13661
CVE-2019-13662
CVE-2019-13663
CVE-2019-13664
CVE-2019-13665
CVE-2019-13666
CVE-2019-13667
CVE-2019-13668
CVE-2019-13669
CVE-2019-13670
CVE-2019-13671
CVE-2019-13673
CVE-2019-13674
CVE-2019-13675
CVE-2019-13676
CVE-2019-13677
CVE-2019-13678
CVE-2019-13679
CVE-2019-13680
CVE-2019-13681
CVE-2019-13682
CVE-2019-13686
CVE-2019-13688
CVE-2019-13691
CVE-2019-13692
CVE-2019-13693
CVE-2019-13694
CVE-2019-13695
CVE-2019-13696
CVE-2019-13697
CVE-2019-13683
CVE-2019-13687
CVE-2019-13685
CVE    46
CVE-2019-13694
CVE-2019-13693
CVE-2019-13697
CVE-2019-13696
...

© SecPod Technologies