Updated chromium-browser packages that fix two security issues are nowavailable for Red Hat Enterprise Linux 6.Red Hat Product Security has rated this update as having Critical securityimpact. Common Vulnerability Scoring System (CVSS) base scores, which givedetailed severity ratings, are available for each vulnerability from theCVE links in the References section.

Chromium is an open-source web browser, powered by WebKit (Blink).Several flaws were found in the processing of malformed web content. A webpage containing malicious content could cause Chromium to crash or,potentially, execute arbitrary code with the privileges of the user runningChromium. (CVE-2015-1233, CVE-2015-1234)All Chromium users should upgrade to these updated packages, which containChromium version 41.0.2272.118, which corrects these issues. Afterinstalling the update, Chromium must be restarted for the changes to takeeffect.
Before applying this update, make sure all previously released erratarelevant to your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258Red Hat Enterprise Linux Desktop Supplementary (v. 6)

SRPMS:
chromium-browser-41.0.2272.118-1.el6_6.src.rpm
    MD5: e5e1df782f996a30e8b81069b77fc0c4SHA-256: 2740fcb1b29a5ce17f1de57af9748ab1e62e5145a6f18b3389902dd356236521
 
IA-32:
chromium-browser-41.0.2272.118-1.el6_6.i686.rpm
    MD5: 83866ba04dd5b901f4cdc5eca1f2e093SHA-256: 8bd080486e0418c8fe0c53ce4232299440dbda323553d30db4395d39a3f2e240
chromium-browser-debuginfo-41.0.2272.118-1.el6_6.i686.rpm
    MD5: 5c71cf9239cfab705338f00b5cf7a760SHA-256: a330583e3d7aed9e3c170599d6836cec4ae6081fad69c010fb12e5a870dbae0a
 
x86_64:
chromium-browser-41.0.2272.118-1.el6_6.x86_64.rpm
    MD5: d8655f3faae576fc33d2b77db6be400cSHA-256: 7cf51284316b249e5081cebecfbbe6aa4ffa46b3b561b528312bb73ebddd4336
chromium-browser-debuginfo-41.0.2272.118-1.el6_6.x86_64.rpm
    MD5: 22e90ac334ca1c9c96f583f648d6080aSHA-256: 14796bd5ca6a600557b7e83e30b0b3d2ef596e146a6bea5a5c63927ed5fa6fda
 
Red Hat Enterprise Linux Server Supplementary (v. 6)

SRPMS:
chromium-browser-41.0.2272.118-1.el6_6.src.rpm
    MD5: e5e1df782f996a30e8b81069b77fc0c4SHA-256: 2740fcb1b29a5ce17f1de57af9748ab1e62e5145a6f18b3389902dd356236521
 
IA-32:
chromium-browser-41.0.2272.118-1.el6_6.i686.rpm
    MD5: 83866ba04dd5b901f4cdc5eca1f2e093SHA-256: 8bd080486e0418c8fe0c53ce4232299440dbda323553d30db4395d39a3f2e240
chromium-browser-debuginfo-41.0.2272.118-1.el6_6.i686.rpm
    MD5: 5c71cf9239cfab705338f00b5cf7a760SHA-256: a330583e3d7aed9e3c170599d6836cec4ae6081fad69c010fb12e5a870dbae0a
 
x86_64:
chromium-browser-41.0.2272.118-1.el6_6.x86_64.rpm
    MD5: d8655f3faae576fc33d2b77db6be400cSHA-256: 7cf51284316b249e5081cebecfbbe6aa4ffa46b3b561b528312bb73ebddd4336
chromium-browser-debuginfo-41.0.2272.118-1.el6_6.x86_64.rpm
    MD5: 22e90ac334ca1c9c96f583f648d6080aSHA-256: 14796bd5ca6a600557b7e83e30b0b3d2ef596e146a6bea5a5c63927ed5fa6fda
 
Red Hat Enterprise Linux Server Supplementary EUS (v. 6.6.z)

SRPMS:
chromium-browser-41.0.2272.118-1.el6_6.src.rpm
    MD5: e5e1df782f996a30e8b81069b77fc0c4SHA-256: 2740fcb1b29a5ce17f1de57af9748ab1e62e5145a6f18b3389902dd356236521
 
IA-32:
chromium-browser-41.0.2272.118-1.el6_6.i686.rpm
    MD5: 83866ba04dd5b901f4cdc5eca1f2e093SHA-256: 8bd080486e0418c8fe0c53ce4232299440dbda323553d30db4395d39a3f2e240
chromium-browser-debuginfo-41.0.2272.118-1.el6_6.i686.rpm
    MD5: 5c71cf9239cfab705338f00b5cf7a760SHA-256: a330583e3d7aed9e3c170599d6836cec4ae6081fad69c010fb12e5a870dbae0a
 
x86_64:
chromium-browser-41.0.2272.118-1.el6_6.x86_64.rpm
    MD5: d8655f3faae576fc33d2b77db6be400cSHA-256: 7cf51284316b249e5081cebecfbbe6aa4ffa46b3b561b528312bb73ebddd4336
chromium-browser-debuginfo-41.0.2272.118-1.el6_6.x86_64.rpm
    MD5: 22e90ac334ca1c9c96f583f648d6080aSHA-256: 14796bd5ca6a600557b7e83e30b0b3d2ef596e146a6bea5a5c63927ed5fa6fda
 
Red Hat Enterprise Linux Workstation Supplementary (v. 6)

SRPMS:
chromium-browser-41.0.2272.118-1.el6_6.src.rpm
    MD5: e5e1df782f996a30e8b81069b77fc0c4SHA-256: 2740fcb1b29a5ce17f1de57af9748ab1e62e5145a6f18b3389902dd356236521
 
IA-32:
chromium-browser-41.0.2272.118-1.el6_6.i686.rpm
    MD5: 83866ba04dd5b901f4cdc5eca1f2e093SHA-256: 8bd080486e0418c8fe0c53ce4232299440dbda323553d30db4395d39a3f2e240
chromium-browser-debuginfo-41.0.2272.118-1.el6_6.i686.rpm
    MD5: 5c71cf9239cfab705338f00b5cf7a760SHA-256: a330583e3d7aed9e3c170599d6836cec4ae6081fad69c010fb12e5a870dbae0a
 
x86_64:
chromium-browser-41.0.2272.118-1.el6_6.x86_64.rpm
    MD5: d8655f3faae576fc33d2b77db6be400cSHA-256: 7cf51284316b249e5081cebecfbbe6aa4ffa46b3b561b528312bb73ebddd4336
chromium-browser-debuginfo-41.0.2272.118-1.el6_6.x86_64.rpm
    MD5: 22e90ac334ca1c9c96f583f648d6080aSHA-256: 14796bd5ca6a600557b7e83e30b0b3d2ef596e146a6bea5a5c63927ed5fa6fda
 
(The unlinked packages above are only available from the Red Hat Network)
1208422 – CVE-2015-1233 chromium-browser: combination of V8, Gamepad and IPC bugs that can lead to remote code execution1208424 – CVE-2015-1234 chromium-browser: buffer overflow via race condition in GPU

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply