- Issued:
- 2017-04-25
- Updated:
- 2017-04-25
RHSA-2017:1124 - Security Advisory
Synopsis
Important: chromium-browser security update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An update for chromium-browser is now available for Red Hat Enterprise Linux 6 Supplementary.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Chromium is an open-source web browser, powered by WebKit (Blink).
This update upgrades Chromium to version 58.0.3029.81.
Security Fix(es):
- Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash, execute arbitrary code, or disclose sensitive information when visited by the victim. (CVE-2017-5057, CVE-2017-5058, CVE-2017-5059, CVE-2017-5060, CVE-2017-5061, CVE-2017-5062, CVE-2017-5063, CVE-2017-5064, CVE-2017-5065, CVE-2017-5066, CVE-2017-5067, CVE-2017-5069)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing the update, Chromium must be restarted for the changes to take effect.
Affected Products
- Red Hat Enterprise Linux Server 6 x86_64
- Red Hat Enterprise Linux Server 6 i386
- Red Hat Enterprise Linux Workstation 6 x86_64
- Red Hat Enterprise Linux Workstation 6 i386
- Red Hat Enterprise Linux Desktop 6 x86_64
- Red Hat Enterprise Linux Desktop 6 i386
Fixes
- BZ - 1443835 - CVE-2017-5057 chromium-browser: type confusion in pdfium
- BZ - 1443836 - CVE-2017-5058 chromium-browser: heap use after free in print preview
- BZ - 1443837 - CVE-2017-5059 chromium-browser: type confusion in blink
- BZ - 1443838 - CVE-2017-5060 chromium-browser: url spoofing in omnibox
- BZ - 1443839 - CVE-2017-5061 chromium-browser: url spoofing in omnibox
- BZ - 1443840 - CVE-2017-5062 chromium-browser: use after free in chrome apps
- BZ - 1443841 - CVE-2017-5063 chromium-browser: heap overflow in skia
- BZ - 1443845 - CVE-2017-5064 chromium-browser: use after free in blink
- BZ - 1443847 - CVE-2017-5065 chromium-browser: incorrect ui in blink
- BZ - 1443848 - CVE-2017-5066 chromium-browser: incorrect signature handing in networking
- BZ - 1443849 - CVE-2017-5067 chromium-browser: url spoofing in omnibox
- BZ - 1443850 - CVE-2017-5069 chromium-browser: cross-origin bypass in blink
CVEs
Red Hat Enterprise Linux Server 6
SRPM | |
---|---|
x86_64 | |
chromium-browser-58.0.3029.81-1.el6_9.x86_64.rpm | SHA-256: 462cb41fd733e0381803864e084a35010f6576ae91f3d55b1730814797bfd6e5 |
chromium-browser-debuginfo-58.0.3029.81-1.el6_9.x86_64.rpm | SHA-256: 00ad0999e5fde71f34ce57f5d8e57d287ff2f699e47fa33548485f9a07d4d4ac |
i386 | |
chromium-browser-58.0.3029.81-1.el6_9.i686.rpm | SHA-256: 6088f075c8592bc89c6d5dbe7f9ff23b5761d6b1f8d49dacf012c4eebbdb0255 |
chromium-browser-debuginfo-58.0.3029.81-1.el6_9.i686.rpm | SHA-256: 038ba6f0ca761754a6e4dfdb118b92c59ef8cdca67faabcfdf213a17c79d0690 |
Red Hat Enterprise Linux Workstation 6
SRPM | |
---|---|
x86_64 | |
chromium-browser-58.0.3029.81-1.el6_9.x86_64.rpm | SHA-256: 462cb41fd733e0381803864e084a35010f6576ae91f3d55b1730814797bfd6e5 |
chromium-browser-debuginfo-58.0.3029.81-1.el6_9.x86_64.rpm | SHA-256: 00ad0999e5fde71f34ce57f5d8e57d287ff2f699e47fa33548485f9a07d4d4ac |
i386 | |
chromium-browser-58.0.3029.81-1.el6_9.i686.rpm | SHA-256: 6088f075c8592bc89c6d5dbe7f9ff23b5761d6b1f8d49dacf012c4eebbdb0255 |
chromium-browser-debuginfo-58.0.3029.81-1.el6_9.i686.rpm | SHA-256: 038ba6f0ca761754a6e4dfdb118b92c59ef8cdca67faabcfdf213a17c79d0690 |
Red Hat Enterprise Linux Desktop 6
SRPM | |
---|---|
x86_64 | |
chromium-browser-58.0.3029.81-1.el6_9.x86_64.rpm | SHA-256: 462cb41fd733e0381803864e084a35010f6576ae91f3d55b1730814797bfd6e5 |
chromium-browser-debuginfo-58.0.3029.81-1.el6_9.x86_64.rpm | SHA-256: 00ad0999e5fde71f34ce57f5d8e57d287ff2f699e47fa33548485f9a07d4d4ac |
i386 | |
chromium-browser-58.0.3029.81-1.el6_9.i686.rpm | SHA-256: 6088f075c8592bc89c6d5dbe7f9ff23b5761d6b1f8d49dacf012c4eebbdb0255 |
chromium-browser-debuginfo-58.0.3029.81-1.el6_9.i686.rpm | SHA-256: 038ba6f0ca761754a6e4dfdb118b92c59ef8cdca67faabcfdf213a17c79d0690 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.