--------------------------------------------------------------------------------
Fedora EPEL Update Notification
FEDORA-EPEL-2018-656b24ec40
2018-07-20 13:58:37.021422
--------------------------------------------------------------------------------
Name : chromium
Product : Fedora EPEL 7
Version : 67.0.3396.79
Release : 1.el7
URL :
http://www.chromium.org/Home
Summary : A WebKit (Blink) powered web browser
Description :
Chromium is an open-source web browser, powered by WebKit (Blink).
--------------------------------------------------------------------------------
Update Information:
Update to Chromium 67. Security fix for CVE-2018-6123 CVE-2018-6124
CVE-2018-6125 CVE-2018-6126 CVE-2018-6127 CVE-2018-6128 CVE-2018-6129
CVE-2018-6130 CVE-2018-6131 CVE-2018-6132 CVE-2018-6133 CVE-2018-6134
CVE-2018-6135 CVE-2018-6136 CVE-2018-6137 CVE-2018-6148 ---- Update to
66.0.3359.181. Security fix for CVE-2018-6085 CVE-2018-6086 CVE-2018-6087
CVE-2018-6088 CVE-2018-6089 CVE-2018-6090 CVE-2018-6091 CVE-2018-6092
CVE-2018-6093 CVE-2018-6094 CVE-2018-6095 CVE-2018-6096 CVE-2018-6097
CVE-2018-6098 CVE-2018-6099 CVE-2018-6100 CVE-2018-6101 CVE-2018-6102
CVE-2018-6103 CVE-2018-6104 CVE-2018-6105 CVE-2018-6106 CVE-2018-6107
CVE-2018-6108 CVE-2018-6109 CVE-2018-6110 CVE-2018-6111 CVE-2018-6112
CVE-2018-6113 CVE-2018-6114 CVE-2018-6116 CVE-2018-6117 CVE-2018-6118
CVE-2018-6120 CVE-2018-6121 CVE-2018-6122
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #1584058 - CVE-2018-6147 chromium-browser: Password fields not taking
advantage of OS protections in Views
https://bugzilla.redhat.com/show_bug.cgi?id=1584058
[ 2 ] Bug #1584057 - CVE-2018-6145 chromium-browser: Incorrect escaping of MathML in
Blink
https://bugzilla.redhat.com/show_bug.cgi?id=1584057
[ 3 ] Bug #1584056 - CVE-2018-6144 chromium-browser: Out of bounds memory access in
PDFium
https://bugzilla.redhat.com/show_bug.cgi?id=1584056
[ 4 ] Bug #1584055 - CVE-2018-6143 chromium-browser: Out of bounds memory access in V8
https://bugzilla.redhat.com/show_bug.cgi?id=1584055
[ 5 ] Bug #1584054 - CVE-2018-6142 chromium-browser: Out of bounds memory access in V8
https://bugzilla.redhat.com/show_bug.cgi?id=1584054
[ 6 ] Bug #1584052 - CVE-2018-6141 chromium-browser: Heap buffer overflow in Skia
https://bugzilla.redhat.com/show_bug.cgi?id=1584052
[ 7 ] Bug #1584051 - CVE-2018-6140 chromium-browser: Restrictions bypass in the debugger
extension API
https://bugzilla.redhat.com/show_bug.cgi?id=1584051
[ 8 ] Bug #1584050 - CVE-2018-6139 chromium-browser: Restrictions bypass in the debugger
extension API
https://bugzilla.redhat.com/show_bug.cgi?id=1584050
[ 9 ] Bug #1584049 - CVE-2018-6138 chromium-browser: Overly permissive policy in
Extensions
https://bugzilla.redhat.com/show_bug.cgi?id=1584049
[ 10 ] Bug #1584048 - CVE-2018-6137 chromium-browser: Leak of visited status of page in
Blink
https://bugzilla.redhat.com/show_bug.cgi?id=1584048
[ 11 ] Bug #1584047 - CVE-2018-6136 chromium-browser: Out of bounds memory access in V8
https://bugzilla.redhat.com/show_bug.cgi?id=1584047
[ 12 ] Bug #1584046 - CVE-2018-6135 chromium-browser: UI spoofing in Blink
https://bugzilla.redhat.com/show_bug.cgi?id=1584046
[ 13 ] Bug #1584045 - CVE-2018-6134 chromium-browser: Referrer Policy bypass in Blink
https://bugzilla.redhat.com/show_bug.cgi?id=1584045
[ 14 ] Bug #1584044 - CVE-2018-6133 chromium-browser: URL spoof in Omnibox
https://bugzilla.redhat.com/show_bug.cgi?id=1584044
[ 15 ] Bug #1584043 - CVE-2018-6132 chromium-browser: Use of uninitialized memory in
WebRTC
https://bugzilla.redhat.com/show_bug.cgi?id=1584043
[ 16 ] Bug #1584042 - CVE-2018-6131 chromium-browser: Incorrect mutability protection in
WebAssembly
https://bugzilla.redhat.com/show_bug.cgi?id=1584042
[ 17 ] Bug #1584040 - CVE-2018-6130 chromium-browser: Out of bounds memory access in
WebRTC
https://bugzilla.redhat.com/show_bug.cgi?id=1584040
[ 18 ] Bug #1584039 - CVE-2018-6129 chromium-browser: Out of bounds memory access in
WebRTC
https://bugzilla.redhat.com/show_bug.cgi?id=1584039
[ 19 ] Bug #1584038 - CVE-2018-6128 chromium-browser: uXSS in Chrome on iOS
https://bugzilla.redhat.com/show_bug.cgi?id=1584038
[ 20 ] Bug #1584037 - CVE-2018-6127 chromium-browser: Use after free in indexedDB
https://bugzilla.redhat.com/show_bug.cgi?id=1584037
[ 21 ] Bug #1584035 - CVE-2018-6126 Skia: Heap buffer overflow rasterizing paths in SVG
https://bugzilla.redhat.com/show_bug.cgi?id=1584035
[ 22 ] Bug #1584034 - CVE-2018-6125 chromium-browser: Overly permissive policy in
WebUSB
https://bugzilla.redhat.com/show_bug.cgi?id=1584034
[ 23 ] Bug #1584033 - CVE-2018-6124 chromium-browser: Type confusion in Blink
https://bugzilla.redhat.com/show_bug.cgi?id=1584033
[ 24 ] Bug #1584032 - CVE-2018-6123 chromium-browser: Use after free in Blink
https://bugzilla.redhat.com/show_bug.cgi?id=1584032
[ 25 ] Bug #1588379 - CVE-2018-6148 chromium-browser: Incorrect handling of CSP header
https://bugzilla.redhat.com/show_bug.cgi?id=1588379
[ 26 ] Bug #1577115 - CVE-2018-6120 chromium-browser: Heap buffer overflow in PDFium
https://bugzilla.redhat.com/show_bug.cgi?id=1577115
[ 27 ] Bug #1577114 - CVE-2018-6122 chromium-browser: Type confusion in V8
https://bugzilla.redhat.com/show_bug.cgi?id=1577114
[ 28 ] Bug #1577113 - CVE-2018-6121 chromium-browser: Privilege Escalation in
extensions
https://bugzilla.redhat.com/show_bug.cgi?id=1577113
[ 29 ] Bug #1573856 - CVE-2018-6118 chromium-browser: Use after free in Media Cache
https://bugzilla.redhat.com/show_bug.cgi?id=1573856
[ 30 ] Bug #1568797 - CVE-2018-6117 chromium-browser: Confusing autofill settings
https://bugzilla.redhat.com/show_bug.cgi?id=1568797
[ 31 ] Bug #1568796 - CVE-2018-6116 chromium-browser: Incorrect low memory handling in
WebAssembly
https://bugzilla.redhat.com/show_bug.cgi?id=1568796
[ 32 ] Bug #1568795 - CVE-2018-6115 chromium-browser: SmartScreen bypass in downloads
https://bugzilla.redhat.com/show_bug.cgi?id=1568795
[ 33 ] Bug #1568794 - CVE-2018-6114 chromium-browser: CSP bypass
https://bugzilla.redhat.com/show_bug.cgi?id=1568794
[ 34 ] Bug #1568793 - CVE-2018-6113 chromium-browser: URL spoof in Navigation
https://bugzilla.redhat.com/show_bug.cgi?id=1568793
[ 35 ] Bug #1568792 - CVE-2018-6112 chromium-browser: Incorrect URL handling in
DevTools
https://bugzilla.redhat.com/show_bug.cgi?id=1568792
[ 36 ] Bug #1568791 - CVE-2018-6111 chromium-browser: Heap-use-after-free in DevTools
https://bugzilla.redhat.com/show_bug.cgi?id=1568791
[ 37 ] Bug #1568790 - CVE-2018-6110 chromium-browser: Incorrect handling of plaintext
files via file://
https://bugzilla.redhat.com/show_bug.cgi?id=1568790
[ 38 ] Bug #1568789 - CVE-2018-6109 chromium-browser: Incorrect handling of files by
FileAPI
https://bugzilla.redhat.com/show_bug.cgi?id=1568789
[ 39 ] Bug #1568788 - CVE-2018-6108 chromium-browser: URL spoof in Omnibox
https://bugzilla.redhat.com/show_bug.cgi?id=1568788
[ 40 ] Bug #1568787 - CVE-2018-6107 chromium-browser: URL spoof in Omnibox
https://bugzilla.redhat.com/show_bug.cgi?id=1568787
[ 41 ] Bug #1568786 - CVE-2018-6106 chromium-browser: Incorrect handling of promises in
V8
https://bugzilla.redhat.com/show_bug.cgi?id=1568786
[ 42 ] Bug #1568785 - CVE-2018-6105 chromium-browser: URL spoof in Omnibox
https://bugzilla.redhat.com/show_bug.cgi?id=1568785
[ 43 ] Bug #1568782 - CVE-2018-6104 chromium-browser: URL spoof in Omnibox
https://bugzilla.redhat.com/show_bug.cgi?id=1568782
[ 44 ] Bug #1568781 - CVE-2018-6103 chromium-browser: UI spoof in Permissions
https://bugzilla.redhat.com/show_bug.cgi?id=1568781
[ 45 ] Bug #1568780 - CVE-2018-6102 chromium-browser: URL spoof in Omnibox
https://bugzilla.redhat.com/show_bug.cgi?id=1568780
[ 46 ] Bug #1568779 - CVE-2018-6101 chromium-browser: Insufficient protection of remote
debugging prototol in DevTools
https://bugzilla.redhat.com/show_bug.cgi?id=1568779
[ 47 ] Bug #1568778 - CVE-2018-6100 chromium-browser: URL spoof in Omnibox
https://bugzilla.redhat.com/show_bug.cgi?id=1568778
[ 48 ] Bug #1568777 - CVE-2018-6099 chromium-browser: CORS bypass in ServiceWorker
https://bugzilla.redhat.com/show_bug.cgi?id=1568777
[ 49 ] Bug #1568776 - CVE-2018-6098 chromium-browser: URL spoof in Omnibox
https://bugzilla.redhat.com/show_bug.cgi?id=1568776
[ 50 ] Bug #1568775 - CVE-2018-6097 chromium-browser: Fullscreen UI spoof
https://bugzilla.redhat.com/show_bug.cgi?id=1568775
[ 51 ] Bug #1568774 - CVE-2018-6096 chromium-browser: Fullscreen UI spoof
https://bugzilla.redhat.com/show_bug.cgi?id=1568774
[ 52 ] Bug #1568773 - CVE-2018-6095 chromium-browser: Lack of meaningful user
interaction requirement before file upload
https://bugzilla.redhat.com/show_bug.cgi?id=1568773
[ 53 ] Bug #1568771 - CVE-2018-6094 chromium-browser: Exploit hardening regression in
Oilpan
https://bugzilla.redhat.com/show_bug.cgi?id=1568771
[ 54 ] Bug #1568770 - CVE-2018-6093 chromium-browser: Same origin bypass in Service
Worker
https://bugzilla.redhat.com/show_bug.cgi?id=1568770
[ 55 ] Bug #1568769 - CVE-2018-6092 chromium-browser: Integer overflow in WebAssembly
https://bugzilla.redhat.com/show_bug.cgi?id=1568769
[ 56 ] Bug #1568767 - CVE-2018-6091 chromium-browser: Incorrect handling of plug-ins by
Service Worker
https://bugzilla.redhat.com/show_bug.cgi?id=1568767
[ 57 ] Bug #1568766 - CVE-2018-6090 chromium-browser: Heap buffer overflow in Skia
https://bugzilla.redhat.com/show_bug.cgi?id=1568766
[ 58 ] Bug #1568765 - CVE-2018-6089 chromium-browser: Same origin policy bypass in
Service Worker
https://bugzilla.redhat.com/show_bug.cgi?id=1568765
[ 59 ] Bug #1568764 - CVE-2018-6088 chromium-browser: Use after free in PDFium
https://bugzilla.redhat.com/show_bug.cgi?id=1568764
[ 60 ] Bug #1568763 - CVE-2018-6087 chromium-browser: Use after free in WebAssembly
https://bugzilla.redhat.com/show_bug.cgi?id=1568763
[ 61 ] Bug #1568762 - CVE-2018-6086 chromium-browser: Use after free in Disk Cache
https://bugzilla.redhat.com/show_bug.cgi?id=1568762
[ 62 ] Bug #1568761 - CVE-2018-6085 chromium-browser: Use after free in Disk Cache
https://bugzilla.redhat.com/show_bug.cgi?id=1568761
--------------------------------------------------------------------------------
This update can be installed with the "yum" update programs. Use
su -c 'yum update chromium' at the command line.
For more information, refer to "YUM", available at
https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/...
All packages are signed with the Fedora EPEL GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------