- Issued:
- 2016-12-07
- Updated:
- 2016-12-07
RHSA-2016:2919 - Security Advisory
Synopsis
Important: chromium-browser security update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An update for chromium-browser is now available for Red Hat Enterprise Linux 6 Supplementary.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Chromium is an open-source web browser, powered by WebKit (Blink).
This update upgrades Chromium to version 55.0.2883.75.
Security Fix(es):
- Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash, execute arbitrary code, or disclose sensitive information when visited by the victim. (CVE-2016-5203, CVE-2016-5204, CVE-2016-5205, CVE-2016-5206, CVE-2016-5207, CVE-2016-5208, CVE-2016-5209, CVE-2016-5210, CVE-2016-5211, CVE-2016-5212, CVE-2016-5213, CVE-2016-9651, CVE-2016-9652, CVE-2016-5214, CVE-2016-5215, CVE-2016-5216, CVE-2016-5217, CVE-2016-5218, CVE-2016-5219, CVE-2016-5220, CVE-2016-5221, CVE-2016-5222, CVE-2016-5223, CVE-2016-5224, CVE-2016-5225, CVE-2016-5226, CVE-2016-9650)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing the update, Chromium must be restarted for the changes to take effect.
Affected Products
- Red Hat Enterprise Linux Server 6 x86_64
- Red Hat Enterprise Linux Server 6 i386
- Red Hat Enterprise Linux Workstation 6 x86_64
- Red Hat Enterprise Linux Workstation 6 i386
- Red Hat Enterprise Linux Desktop 6 x86_64
- Red Hat Enterprise Linux Desktop 6 i386
Fixes
- BZ - 1400850 - CVE-2016-9651 chromium-browser: private property access in v8
- BZ - 1400851 - CVE-2016-5208 chromium-browser: universal xss in blink
- BZ - 1400852 - CVE-2016-5207 chromium-browser: universal xss in blink
- BZ - 1400853 - CVE-2016-5206 chromium-browser: same-origin bypass in pdfium
- BZ - 1400854 - CVE-2016-5205 chromium-browser: universal xss in blink
- BZ - 1400855 - CVE-2016-5204 chromium-browser: universal xss in blink
- BZ - 1400856 - CVE-2016-5209 chromium-browser: out of bounds write in blink
- BZ - 1400857 - CVE-2016-5203 chromium-browser: use after free in pdfium
- BZ - 1400859 - CVE-2016-5210 chromium-browser: out of bounds write in pdfium
- BZ - 1400861 - CVE-2016-5212 chromium-browser: local file disclosure in devtools
- BZ - 1400862 - CVE-2016-5211 chromium-browser: use after free in pdfium
- BZ - 1400863 - CVE-2016-5213 chromium-browser: use after free in v8
- BZ - 1400864 - CVE-2016-5214 chromium-browser: file download protection bypass
- BZ - 1400865 - CVE-2016-5216 chromium-browser: use after free in pdfium
- BZ - 1400866 - CVE-2016-5215 chromium-browser: use after free in webaudio
- BZ - 1400867 - CVE-2016-5217 chromium-browser: use of unvalidated data in pdfium
- BZ - 1400868 - CVE-2016-5218 chromium-browser: address spoofing in omnibox
- BZ - 1400869 - CVE-2016-5219 chromium-browser: use after free in v8
- BZ - 1400870 - CVE-2016-5221 chromium-browser: integer overflow in angle
- BZ - 1400871 - CVE-2016-5220 chromium-browser: local file access in pdfium
- BZ - 1400872 - CVE-2016-5222 chromium-browser: address spoofing in omnibox
- BZ - 1400873 - CVE-2016-9650 chromium-browser: csp referrer disclosure
- BZ - 1400875 - CVE-2016-5223 chromium-browser: integer overflow in pdfium
- BZ - 1400876 - CVE-2016-5226 chromium-browser: limited xss in blink
- BZ - 1400877 - CVE-2016-5225 chromium-browser: csp bypass in blink
- BZ - 1400878 - CVE-2016-5224 chromium-browser: same-origin bypass in svg
- BZ - 1400879 - CVE-2016-9652 chromium-browser: various fixes from internal audits
CVEs
- CVE-2016-5203
- CVE-2016-5204
- CVE-2016-5205
- CVE-2016-5206
- CVE-2016-5207
- CVE-2016-5208
- CVE-2016-5209
- CVE-2016-5210
- CVE-2016-5211
- CVE-2016-5212
- CVE-2016-5213
- CVE-2016-5214
- CVE-2016-5215
- CVE-2016-5216
- CVE-2016-5217
- CVE-2016-5218
- CVE-2016-5219
- CVE-2016-5220
- CVE-2016-5221
- CVE-2016-5222
- CVE-2016-5223
- CVE-2016-5224
- CVE-2016-5225
- CVE-2016-5226
- CVE-2016-9650
- CVE-2016-9651
- CVE-2016-9652
Red Hat Enterprise Linux Server 6
SRPM | |
---|---|
x86_64 | |
chromium-browser-55.0.2883.75-1.el6.x86_64.rpm | SHA-256: 93698d3b303edcd46228a6a833813c3a10b07119fae6783874869ff15277cf0b |
chromium-browser-debuginfo-55.0.2883.75-1.el6.x86_64.rpm | SHA-256: 57c4adba3beb57a2f160018045f83824cece62fb74099198fb7b3052dff19b08 |
i386 | |
chromium-browser-55.0.2883.75-1.el6.i686.rpm | SHA-256: 04d12ea75c416b07d194a728a5fb793e9b901fd4c413e63166fc6d701866ace5 |
chromium-browser-debuginfo-55.0.2883.75-1.el6.i686.rpm | SHA-256: c3ea75fa85b82d04ee7688e14d3e3ebb9a9171a7de05c6f3dc1e38650bdf21c7 |
Red Hat Enterprise Linux Workstation 6
SRPM | |
---|---|
x86_64 | |
chromium-browser-55.0.2883.75-1.el6.x86_64.rpm | SHA-256: 93698d3b303edcd46228a6a833813c3a10b07119fae6783874869ff15277cf0b |
chromium-browser-debuginfo-55.0.2883.75-1.el6.x86_64.rpm | SHA-256: 57c4adba3beb57a2f160018045f83824cece62fb74099198fb7b3052dff19b08 |
i386 | |
chromium-browser-55.0.2883.75-1.el6.i686.rpm | SHA-256: 04d12ea75c416b07d194a728a5fb793e9b901fd4c413e63166fc6d701866ace5 |
chromium-browser-debuginfo-55.0.2883.75-1.el6.i686.rpm | SHA-256: c3ea75fa85b82d04ee7688e14d3e3ebb9a9171a7de05c6f3dc1e38650bdf21c7 |
Red Hat Enterprise Linux Desktop 6
SRPM | |
---|---|
x86_64 | |
chromium-browser-55.0.2883.75-1.el6.x86_64.rpm | SHA-256: 93698d3b303edcd46228a6a833813c3a10b07119fae6783874869ff15277cf0b |
chromium-browser-debuginfo-55.0.2883.75-1.el6.x86_64.rpm | SHA-256: 57c4adba3beb57a2f160018045f83824cece62fb74099198fb7b3052dff19b08 |
i386 | |
chromium-browser-55.0.2883.75-1.el6.i686.rpm | SHA-256: 04d12ea75c416b07d194a728a5fb793e9b901fd4c413e63166fc6d701866ace5 |
chromium-browser-debuginfo-55.0.2883.75-1.el6.i686.rpm | SHA-256: c3ea75fa85b82d04ee7688e14d3e3ebb9a9171a7de05c6f3dc1e38650bdf21c7 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.