- Issued:
- 2016-07-26
- Updated:
- 2016-07-26
RHSA-2016:1485 - Security Advisory
Synopsis
Important: chromium-browser security update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An update for chromium-browser is now available for Red Hat Enterprise Linux 6 Supplementary.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Chromium is an open-source web browser, powered by WebKit (Blink).
This update upgrades Chromium to version 52.0.2743.82.
Security Fix(es):
- Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash, execute arbitrary code, or disclose sensitive information when visited by the victim. (CVE-2016-1706, CVE-2016-1708, CVE-2016-1709, CVE-2016-1710, CVE-2016-1711, CVE-2016-5127, CVE-2016-5128, CVE-2016-5129, CVE-2016-5130, CVE-2016-5131, CVE-2016-5132, CVE-2016-5133, CVE-2016-5134, CVE-2016-5135, CVE-2016-5136, CVE-2016-5137, CVE-2016-1705)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing the update, Chromium must be restarted for the changes to take effect.
Affected Products
- Red Hat Enterprise Linux Server 6 x86_64
- Red Hat Enterprise Linux Server 6 i386
- Red Hat Enterprise Linux Workstation 6 x86_64
- Red Hat Enterprise Linux Workstation 6 i386
- Red Hat Enterprise Linux Desktop 6 x86_64
- Red Hat Enterprise Linux Desktop 6 i386
Fixes
- BZ - 1358630 - CVE-2016-1706 chromium-browser: sandbox escape in ppapi
- BZ - 1358632 - CVE-2016-1708 chromium-browser: use-after-free in extensions
- BZ - 1358633 - CVE-2016-1709 chromium-browser: heap-buffer-overflow in sfntly
- BZ - 1358634 - CVE-2016-1710 chromium-browser: same-origin bypass in blink
- BZ - 1358636 - CVE-2016-1711 chromium-browser: same-origin bypass in blink
- BZ - 1358637 - CVE-2016-5127 chromium-browser: use-after-free in blink
- BZ - 1358638 - CVE-2016-5128 chromium-browser: same-origin bypass in v8
- BZ - 1358639 - CVE-2016-5129 chromium-browser: memory corruption in v8
- BZ - 1358640 - CVE-2016-5130 chromium-browser: url spoofing
- BZ - 1358641 - CVE-2016-5131 chromium-browser: use-after-free in libxml
- BZ - 1358642 - CVE-2016-5132 chromium-browser: limited same-origin bypass in service workers
- BZ - 1358643 - CVE-2016-5133 chromium-browser: origin confusion in proxy authentication
- BZ - 1358645 - CVE-2016-5134 chromium-browser: url leakage via pac script
- BZ - 1358646 - CVE-2016-5135 chromium-browser: content-security-policy bypass
- BZ - 1358647 - CVE-2016-5136 chromium-browser: use after free in extensions
- BZ - 1358648 - CVE-2016-5137 chromium-browser: history sniffing with hsts and csp
- BZ - 1358649 - CVE-2016-1705 chromium-browser: various fixes from internal audits
CVEs
Red Hat Enterprise Linux Server 6
SRPM | |
---|---|
x86_64 | |
chromium-browser-52.0.2743.82-1.el6.x86_64.rpm | SHA-256: dbd8b3a6dcf9dadc800c294778588176cabe6f7a646fcb93fdcfb5c8bd5de7de |
chromium-browser-debuginfo-52.0.2743.82-1.el6.x86_64.rpm | SHA-256: 60d42ca65b05e68a1f4533f23514de13bbd04d040294e2428398d5916f9bf809 |
i386 | |
chromium-browser-52.0.2743.82-1.el6.i686.rpm | SHA-256: 4bd1826477348285d4d27452548120aed39ef9e378cf0816711da48ff649c5e0 |
chromium-browser-debuginfo-52.0.2743.82-1.el6.i686.rpm | SHA-256: c0cd9845fcf27cbe09e044ca74df5da3553a1b5432accc8063e7ec58413d65b0 |
Red Hat Enterprise Linux Workstation 6
SRPM | |
---|---|
x86_64 | |
chromium-browser-52.0.2743.82-1.el6.x86_64.rpm | SHA-256: dbd8b3a6dcf9dadc800c294778588176cabe6f7a646fcb93fdcfb5c8bd5de7de |
chromium-browser-debuginfo-52.0.2743.82-1.el6.x86_64.rpm | SHA-256: 60d42ca65b05e68a1f4533f23514de13bbd04d040294e2428398d5916f9bf809 |
i386 | |
chromium-browser-52.0.2743.82-1.el6.i686.rpm | SHA-256: 4bd1826477348285d4d27452548120aed39ef9e378cf0816711da48ff649c5e0 |
chromium-browser-debuginfo-52.0.2743.82-1.el6.i686.rpm | SHA-256: c0cd9845fcf27cbe09e044ca74df5da3553a1b5432accc8063e7ec58413d65b0 |
Red Hat Enterprise Linux Desktop 6
SRPM | |
---|---|
x86_64 | |
chromium-browser-52.0.2743.82-1.el6.x86_64.rpm | SHA-256: dbd8b3a6dcf9dadc800c294778588176cabe6f7a646fcb93fdcfb5c8bd5de7de |
chromium-browser-debuginfo-52.0.2743.82-1.el6.x86_64.rpm | SHA-256: 60d42ca65b05e68a1f4533f23514de13bbd04d040294e2428398d5916f9bf809 |
i386 | |
chromium-browser-52.0.2743.82-1.el6.i686.rpm | SHA-256: 4bd1826477348285d4d27452548120aed39ef9e378cf0816711da48ff649c5e0 |
chromium-browser-debuginfo-52.0.2743.82-1.el6.i686.rpm | SHA-256: c0cd9845fcf27cbe09e044ca74df5da3553a1b5432accc8063e7ec58413d65b0 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.