- Issued:
- 2017-03-31
- Updated:
- 2017-03-31
RHSA-2017:0860 - Security Advisory
Synopsis
Critical: chromium-browser security update
Type/Severity
Security Advisory: Critical
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An update for chromium-browser is now available for Red Hat Enterprise Linux 6 Supplementary.
Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Chromium is an open-source web browser, powered by WebKit (Blink).
This update upgrades Chromium to version 57.0.2987.133.
Security Fix(es):
- Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash, execute arbitrary code, or disclose sensitive information when visited by the victim. (CVE-2017-5055, CVE-2017-5052, CVE-2017-5053, CVE-2017-5054, CVE-2017-5056)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing the update, Chromium must be restarted for the changes to take effect.
Affected Products
- Red Hat Enterprise Linux Server 6 x86_64
- Red Hat Enterprise Linux Server 6 i386
- Red Hat Enterprise Linux Workstation 6 x86_64
- Red Hat Enterprise Linux Workstation 6 i386
- Red Hat Enterprise Linux Desktop 6 x86_64
- Red Hat Enterprise Linux Desktop 6 i386
Fixes
- BZ - 1437348 - CVE-2017-5055 chromium-browser: use after free in printing
- BZ - 1437350 - CVE-2017-5054 chromium-browser: heap buffer overflow in v8
- BZ - 1437351 - CVE-2017-5052 chromium-browser: bad cast in blink
- BZ - 1437352 - CVE-2017-5056 chromium-browser: use after free in blink
- BZ - 1437353 - CVE-2017-5053 chromium-browser: out of bounds memory access in v8
Red Hat Enterprise Linux Server 6
SRPM | |
---|---|
x86_64 | |
chromium-browser-57.0.2987.133-1.el6_9.x86_64.rpm | SHA-256: 5d49c432d5a0cc3e799ff596e8e4cf1a3191bd64b2f45e4319400daba8d02796 |
chromium-browser-debuginfo-57.0.2987.133-1.el6_9.x86_64.rpm | SHA-256: 8e95e15f3dcb9927c69f6a679d7027334af4f0376d86f7ac3bae195e25ab8385 |
i386 | |
chromium-browser-57.0.2987.133-1.el6_9.i686.rpm | SHA-256: d87ae04985907c487abb7a0905b88a2149db21d6c4f373854eb68572f62fdc09 |
chromium-browser-debuginfo-57.0.2987.133-1.el6_9.i686.rpm | SHA-256: b924e9278577746eb956630eb3c02681b4d2c0d2bfdeb9dbb1fdc1deea5de7cc |
Red Hat Enterprise Linux Workstation 6
SRPM | |
---|---|
x86_64 | |
chromium-browser-57.0.2987.133-1.el6_9.x86_64.rpm | SHA-256: 5d49c432d5a0cc3e799ff596e8e4cf1a3191bd64b2f45e4319400daba8d02796 |
chromium-browser-debuginfo-57.0.2987.133-1.el6_9.x86_64.rpm | SHA-256: 8e95e15f3dcb9927c69f6a679d7027334af4f0376d86f7ac3bae195e25ab8385 |
i386 | |
chromium-browser-57.0.2987.133-1.el6_9.i686.rpm | SHA-256: d87ae04985907c487abb7a0905b88a2149db21d6c4f373854eb68572f62fdc09 |
chromium-browser-debuginfo-57.0.2987.133-1.el6_9.i686.rpm | SHA-256: b924e9278577746eb956630eb3c02681b4d2c0d2bfdeb9dbb1fdc1deea5de7cc |
Red Hat Enterprise Linux Desktop 6
SRPM | |
---|---|
x86_64 | |
chromium-browser-57.0.2987.133-1.el6_9.x86_64.rpm | SHA-256: 5d49c432d5a0cc3e799ff596e8e4cf1a3191bd64b2f45e4319400daba8d02796 |
chromium-browser-debuginfo-57.0.2987.133-1.el6_9.x86_64.rpm | SHA-256: 8e95e15f3dcb9927c69f6a679d7027334af4f0376d86f7ac3bae195e25ab8385 |
i386 | |
chromium-browser-57.0.2987.133-1.el6_9.i686.rpm | SHA-256: d87ae04985907c487abb7a0905b88a2149db21d6c4f373854eb68572f62fdc09 |
chromium-browser-debuginfo-57.0.2987.133-1.el6_9.i686.rpm | SHA-256: b924e9278577746eb956630eb3c02681b4d2c0d2bfdeb9dbb1fdc1deea5de7cc |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.