Bug 1475210 (CVE-2017-5107)

Summary: CVE-2017-5107 chromium-browser: user information leak via svg
Product: [Other] Security Response Reporter: Adam Mariš <amaris>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: tcallawa, tpopela, yaneti
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Chrome 60.0.3112.78 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2017-08-04 07:46:03 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1475216, 1475220, 1475221    
Bug Blocks: 1475215    

Description Adam Mariš 2017-07-26 08:05:48 UTC
The following flaw was identified in the Chromium browser: user information leak via svg.

Upstream bug(s):

https://code.google.com/p/chromium/issues/detail?id=686253

External References:

https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.html

Comment 1 Adam Mariš 2017-07-26 08:14:02 UTC
Created chromium tracking bugs for this issue:

Affects: fedora-all [bug 1475216]

Comment 3 errata-xmlrpc 2017-07-31 14:34:19 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6 Supplementary

Via RHSA-2017:1833 https://access.redhat.com/errata/RHSA-2017:1833

Comment 4 Huzaifa S. Sidhpurwala 2017-08-04 07:46:03 UTC
This security flaw affects chrome (chromium) when it is run on a platform which supports GPU acceleration of SVG filters. The attack does not run on the GPU, but takes advantage of the FTZ and DAZ FPU flags being disabled if the element being rendered is already texture backed.

Therefore issue is not a flaw in the SVG rendering library (libsrvg2 shipped with Red Hat Enterprise Linux)