- Issued:
- 2016-06-01
- Updated:
- 2016-06-01
RHSA-2016:1190 - Security Advisory
Synopsis
Important: chromium-browser security update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An update for chromium-browser is now available for Red Hat Enterprise Linux 6 Supplementary.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Chromium is an open-source web browser, powered by WebKit (Blink).
This update upgrades Chromium to version 51.0.2704.63.
Security Fix(es):
- Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash, execute arbitrary code, or disclose sensitive information when visited by the victim. (CVE-2016-1672, CVE-2016-1673, CVE-2016-1674, CVE-2016-1675, CVE-2016-1676, CVE-2016-1678, CVE-2016-1679, CVE-2016-1680, CVE-2016-1681, CVE-2016-1695, CVE-2016-1677, CVE-2016-1682, CVE-2016-1683, CVE-2016-1684, CVE-2016-1685, CVE-2016-1686, CVE-2016-1687, CVE-2016-1688, CVE-2016-1689, CVE-2016-1690, CVE-2016-1691, CVE-2016-1692, CVE-2016-1693, CVE-2016-1694)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing the update, Chromium must be restarted for the changes to take effect.
Affected Products
- Red Hat Enterprise Linux Server 6 x86_64
- Red Hat Enterprise Linux Server 6 i386
- Red Hat Enterprise Linux Workstation 6 x86_64
- Red Hat Enterprise Linux Workstation 6 i386
- Red Hat Enterprise Linux Desktop 6 x86_64
- Red Hat Enterprise Linux Desktop 6 i386
Fixes
- BZ - 1340005 - CVE-2016-1672 chromium-browser: cross-origin bypass in extension bindings
- BZ - 1340006 - CVE-2016-1673 chromium-browser: cross-origin bypass in blink
- BZ - 1340007 - CVE-2016-1674 chromium-browser: cross-origin bypass in extensions
- BZ - 1340008 - CVE-2016-1675 chromium-browser: cross-origin bypass in blink
- BZ - 1340009 - CVE-2016-1676 chromium-browser: cross-origin bypass in extension bindings
- BZ - 1340010 - CVE-2016-1677 chromium-browser: type confusion in v8
- BZ - 1340011 - CVE-2016-1678 chromium-browser: heap overflow in v8
- BZ - 1340012 - CVE-2016-1679 chromium-browser: heap use-after-free in v8 bindings
- BZ - 1340013 - CVE-2016-1680 chromium-browser: heap use-after-free in skia
- BZ - 1340014 - CVE-2016-1681 chromium-browser: heap overflow in pdfium
- BZ - 1340015 - CVE-2016-1682 chromium-browser: csp bypass for serviceworker
- BZ - 1340016 - CVE-2016-1683 chromium-browser: out-of-bounds access in libxslt
- BZ - 1340017 - CVE-2016-1684 chromium-browser: integer overflow in libxslt
- BZ - 1340018 - CVE-2016-1685 chromium-browser: out-of-bounds read in pdfium
- BZ - 1340019 - CVE-2016-1686 chromium-browser: out-of-bounds read in pdfium
- BZ - 1340021 - CVE-2016-1687 chromium-browser: information leak in extensions
- BZ - 1340022 - CVE-2016-1688 chromium-browser: out-of-bounds read in v8
- BZ - 1340023 - CVE-2016-1689 chromium-browser: heap buffer overflow in media
- BZ - 1340024 - CVE-2016-1690 chromium-browser: heap use-after-free in autofill
- BZ - 1340026 - CVE-2016-1691 chromium-browser: heap buffer-overflow in skia
- BZ - 1340027 - CVE-2016-1692 chromium-browser: limited cross-origin bypass in serviceworker
- BZ - 1340028 - CVE-2016-1693 chromium-browser: http download of software removal tool
- BZ - 1340029 - CVE-2016-1694 chromium-browser: hpkp pins removed on cache clearance
- BZ - 1340030 - CVE-2016-1695 chromium-browser: various fixes from internal audits
CVEs
- CVE-2016-1672
- CVE-2016-1673
- CVE-2016-1674
- CVE-2016-1675
- CVE-2016-1676
- CVE-2016-1677
- CVE-2016-1678
- CVE-2016-1679
- CVE-2016-1680
- CVE-2016-1681
- CVE-2016-1682
- CVE-2016-1683
- CVE-2016-1684
- CVE-2016-1685
- CVE-2016-1686
- CVE-2016-1687
- CVE-2016-1688
- CVE-2016-1689
- CVE-2016-1690
- CVE-2016-1691
- CVE-2016-1692
- CVE-2016-1693
- CVE-2016-1694
- CVE-2016-1695
Red Hat Enterprise Linux Server 6
SRPM | |
---|---|
x86_64 | |
chromium-browser-51.0.2704.63-1.el6.x86_64.rpm | SHA-256: 694138bdebf8dff7cda5cd8cd1fdd3cf710510bf8c9248dbba37b0cd5a064c60 |
chromium-browser-debuginfo-51.0.2704.63-1.el6.x86_64.rpm | SHA-256: cf962b4607d655b68f806bddfd9d04031a01bc2324708eac2c6b9c41aec8eebb |
i386 | |
chromium-browser-51.0.2704.63-1.el6.i686.rpm | SHA-256: ed4c4191b10d40bd40f1a59ca2829e366b22b843fe3ac5ccdae35492796715e2 |
chromium-browser-debuginfo-51.0.2704.63-1.el6.i686.rpm | SHA-256: 7b8490716805a6e2702713023854c871e4c61f98093dcb710c0b1e86452591e4 |
Red Hat Enterprise Linux Workstation 6
SRPM | |
---|---|
x86_64 | |
chromium-browser-51.0.2704.63-1.el6.x86_64.rpm | SHA-256: 694138bdebf8dff7cda5cd8cd1fdd3cf710510bf8c9248dbba37b0cd5a064c60 |
chromium-browser-debuginfo-51.0.2704.63-1.el6.x86_64.rpm | SHA-256: cf962b4607d655b68f806bddfd9d04031a01bc2324708eac2c6b9c41aec8eebb |
i386 | |
chromium-browser-51.0.2704.63-1.el6.i686.rpm | SHA-256: ed4c4191b10d40bd40f1a59ca2829e366b22b843fe3ac5ccdae35492796715e2 |
chromium-browser-debuginfo-51.0.2704.63-1.el6.i686.rpm | SHA-256: 7b8490716805a6e2702713023854c871e4c61f98093dcb710c0b1e86452591e4 |
Red Hat Enterprise Linux Desktop 6
SRPM | |
---|---|
x86_64 | |
chromium-browser-51.0.2704.63-1.el6.x86_64.rpm | SHA-256: 694138bdebf8dff7cda5cd8cd1fdd3cf710510bf8c9248dbba37b0cd5a064c60 |
chromium-browser-debuginfo-51.0.2704.63-1.el6.x86_64.rpm | SHA-256: cf962b4607d655b68f806bddfd9d04031a01bc2324708eac2c6b9c41aec8eebb |
i386 | |
chromium-browser-51.0.2704.63-1.el6.i686.rpm | SHA-256: ed4c4191b10d40bd40f1a59ca2829e366b22b843fe3ac5ccdae35492796715e2 |
chromium-browser-debuginfo-51.0.2704.63-1.el6.i686.rpm | SHA-256: 7b8490716805a6e2702713023854c871e4c61f98093dcb710c0b1e86452591e4 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.