- Issued:
- 2016-06-02
- Updated:
- 2016-06-02
RHSA-2016:1201 - Security Advisory
Synopsis
Important: chromium-browser security update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An update for chromium-browser is now available for Red Hat Enterprise Linux 6 Supplementary.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Chromium is an open-source web browser, powered by WebKit (Blink).
This update upgrades Chromium to version 51.0.2704.79.
Security Fix(es):
- Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash, execute arbitrary code, or disclose sensitive information when visited by the victim. (CVE-2016-1696, CVE-2016-1697, CVE-2016-1703, CVE-2016-1698, CVE-2016-1699, CVE-2016-1700, CVE-2016-1701, CVE-2016-1702)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing the update, Chromium must be restarted for the changes to take effect.
Affected Products
- Red Hat Enterprise Linux Server 6 x86_64
- Red Hat Enterprise Linux Server 6 i386
- Red Hat Enterprise Linux Workstation 6 x86_64
- Red Hat Enterprise Linux Workstation 6 i386
- Red Hat Enterprise Linux Desktop 6 x86_64
- Red Hat Enterprise Linux Desktop 6 i386
Fixes
- BZ - 1342001 - CVE-2016-1696 chromium-browser: cross-origin bypass in extension bindings
- BZ - 1342002 - CVE-2016-1697 chromium-browser: cross-origin bypass in blink
- BZ - 1342003 - CVE-2016-1698 chromium-browser: information leak in extension bindings
- BZ - 1342004 - CVE-2016-1699 chromium-browser: parameter sanitization failure in devtools
- BZ - 1342005 - CVE-2016-1700 chromium-browser: use-after-free in extensions
- BZ - 1342007 - CVE-2016-1701 chromium-browser: use-after-free in autofill
- BZ - 1342008 - CVE-2016-1702 chromium-browser: out-of-bounds read in skia
- BZ - 1342009 - CVE-2016-1703 chromium-browser: various fixes from internal audits
CVEs
Red Hat Enterprise Linux Server 6
SRPM | |
---|---|
x86_64 | |
chromium-browser-51.0.2704.79-1.el6.x86_64.rpm | SHA-256: d48a0a614f010aeb9582b34aa3dcce5fdbe68408079220f09ab03ecf6a1f33fb |
chromium-browser-debuginfo-51.0.2704.79-1.el6.x86_64.rpm | SHA-256: 65dfaf33c5e9fc7e25be3c47ff54a4966f1a77ddbfe7778f5008a4e9d0c9a83b |
i386 | |
chromium-browser-51.0.2704.79-1.el6.i686.rpm | SHA-256: d7a8b7642c79fb120a7e27069c6e11396910f4336212d2fc96f6484611308bd9 |
chromium-browser-debuginfo-51.0.2704.79-1.el6.i686.rpm | SHA-256: 3aa94529ac1eda38fecae71a44066dec34efefaf5b0a650aab8e85de588eac17 |
Red Hat Enterprise Linux Workstation 6
SRPM | |
---|---|
x86_64 | |
chromium-browser-51.0.2704.79-1.el6.x86_64.rpm | SHA-256: d48a0a614f010aeb9582b34aa3dcce5fdbe68408079220f09ab03ecf6a1f33fb |
chromium-browser-debuginfo-51.0.2704.79-1.el6.x86_64.rpm | SHA-256: 65dfaf33c5e9fc7e25be3c47ff54a4966f1a77ddbfe7778f5008a4e9d0c9a83b |
i386 | |
chromium-browser-51.0.2704.79-1.el6.i686.rpm | SHA-256: d7a8b7642c79fb120a7e27069c6e11396910f4336212d2fc96f6484611308bd9 |
chromium-browser-debuginfo-51.0.2704.79-1.el6.i686.rpm | SHA-256: 3aa94529ac1eda38fecae71a44066dec34efefaf5b0a650aab8e85de588eac17 |
Red Hat Enterprise Linux Desktop 6
SRPM | |
---|---|
x86_64 | |
chromium-browser-51.0.2704.79-1.el6.x86_64.rpm | SHA-256: d48a0a614f010aeb9582b34aa3dcce5fdbe68408079220f09ab03ecf6a1f33fb |
chromium-browser-debuginfo-51.0.2704.79-1.el6.x86_64.rpm | SHA-256: 65dfaf33c5e9fc7e25be3c47ff54a4966f1a77ddbfe7778f5008a4e9d0c9a83b |
i386 | |
chromium-browser-51.0.2704.79-1.el6.i686.rpm | SHA-256: d7a8b7642c79fb120a7e27069c6e11396910f4336212d2fc96f6484611308bd9 |
chromium-browser-debuginfo-51.0.2704.79-1.el6.i686.rpm | SHA-256: 3aa94529ac1eda38fecae71a44066dec34efefaf5b0a650aab8e85de588eac17 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.