RHEL 6 : chromium-browser (RHSA-2020:3723)

high Nessus Plugin ID 140494

Synopsis

The remote Red Hat host is missing one or more security updates for chromium-browser.

Description

The remote Redhat Enterprise Linux 6 host has a package installed that is affected by multiple vulnerabilities as referenced in the RHSA-2020:3723 advisory.

Chromium is an open-source web browser, powered by WebKit (Blink).

This update upgrades Chromium to version 85.0.4183.83.

Security Fix(es):

* chromium-browser: Use after free in presentation API (CVE-2020-6559)

* chromium-browser: Incorrect security UI in Omnibox (CVE-2020-6571)

* chromium-browser: Insufficient policy enforcement in autofill (CVE-2020-6560)

* chromium-browser: Inappropriate implementation in Content Security Policy (CVE-2020-6561)

* chromium-browser: Insufficient policy enforcement in Blink (CVE-2020-6562)

* chromium-browser: Insufficient policy enforcement in intent handling (CVE-2020-6563)

* chromium-browser: Incorrect security UI in permissions (CVE-2020-6564)

* chromium-browser: Incorrect security UI in Omnibox (CVE-2020-6565)

* chromium-browser: Insufficient policy enforcement in media (CVE-2020-6566)

* chromium-browser: Insufficient validation of untrusted input in command line handling (CVE-2020-6567)

* chromium-browser: Insufficient policy enforcement in intent handling (CVE-2020-6568)

* chromium-browser: Integer overflow in WebUSB (CVE-2020-6569)

* chromium-browser: Side-channel information leakage in WebRTC (CVE-2020-6570)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the RHEL chromium-browser package based on the guidance in RHSA-2020:3723.

See Also

http://www.nessus.org/u?2d860026

https://access.redhat.com/security/updates/classification/#important

https://access.redhat.com/errata/RHSA-2020:3723

https://bugzilla.redhat.com/show_bug.cgi?id=1872945

https://bugzilla.redhat.com/show_bug.cgi?id=1872946

https://bugzilla.redhat.com/show_bug.cgi?id=1872947

https://bugzilla.redhat.com/show_bug.cgi?id=1872948

https://bugzilla.redhat.com/show_bug.cgi?id=1872949

https://bugzilla.redhat.com/show_bug.cgi?id=1872950

https://bugzilla.redhat.com/show_bug.cgi?id=1872951

https://bugzilla.redhat.com/show_bug.cgi?id=1872952

https://bugzilla.redhat.com/show_bug.cgi?id=1872953

https://bugzilla.redhat.com/show_bug.cgi?id=1872955

https://bugzilla.redhat.com/show_bug.cgi?id=1872956

https://bugzilla.redhat.com/show_bug.cgi?id=1872957

https://bugzilla.redhat.com/show_bug.cgi?id=1872958

Plugin Details

Severity: High

ID: 140494

File Name: redhat-RHSA-2020-3723.nasl

Version: 1.11

Type: local

Agent: unix

Published: 9/10/2020

Updated: 11/7/2024

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

Vendor

Vendor Severity: Important

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2020-6559

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.9

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:chromium-browser, cpe:/o:redhat:enterprise_linux:6

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 9/10/2020

Vulnerability Publication Date: 8/25/2020

Reference Information

CVE: CVE-2020-6559, CVE-2020-6560, CVE-2020-6561, CVE-2020-6562, CVE-2020-6563, CVE-2020-6564, CVE-2020-6565, CVE-2020-6566, CVE-2020-6567, CVE-2020-6568, CVE-2020-6569, CVE-2020-6570, CVE-2020-6571

CWE: 190, 20, 203, 358, 416

IAVA: 2020-A-0388-S

RHSA: 2020:3723