Updated chromium-browser packages that fix multiple security issues are nowavailable for Red Hat Enterprise Linux 6.Red Hat Product Security has rated this update as having Important securityimpact. Common Vulnerability Scoring System (CVSS) base scores, which givedetailed severity ratings, are available for each vulnerability from theCVE links in the References section.

Chromium is an open-source web browser, powered by WebKit (Blink).Several flaws were found in the processing of malformed web content. A webpage containing malicious content could cause Chromium to crash or,potentially, execute arbitrary code with the privileges of the user runningChromium.(CVE-2015-1235, CVE-2015-1236, CVE-2015-1237, CVE-2015-1238,CVE-2015-1240, CVE-2015-1241, CVE-2015-1242, CVE-2015-1244, CVE-2015-1245,CVE-2015-1246, CVE-2015-1247, CVE-2015-1248, CVE-2015-1249)All Chromium users should upgrade to these updated packages, which containChromium version 42.0.2311.90, which corrects these issues. Afterinstalling the update, Chromium must be restarted for the changes to takeeffect.
Before applying this update, make sure all previously released erratarelevant to your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258Red Hat Enterprise Linux Desktop Supplementary (v. 6)

SRPMS:
chromium-browser-42.0.2311.90-1.el6_6.src.rpm
    MD5: 49fe99b2d2fcefb5c46fc84655e02d27SHA-256: 854b6a9a22490fa19f916fbbced4acc7dd8a10d4bd73ce457a5d4e174faf3395
 
IA-32:
chromium-browser-42.0.2311.90-1.el6_6.i686.rpm
    MD5: 6e7fc3448c99aee89278d691e33ad170SHA-256: bf2718a1165e7be13f0f11824a5ba119c5d6e790be9b429c1b54a0bbfea22fdf
chromium-browser-debuginfo-42.0.2311.90-1.el6_6.i686.rpm
    MD5: 86aa3c7ede28baf5cf1b836017c87a96SHA-256: 5ef2b36a987ce40f97b24e9ad149c02548da214db416f09f214f8ea4d30b74c6
 
x86_64:
chromium-browser-42.0.2311.90-1.el6_6.x86_64.rpm
    MD5: db49c9e10015903beb3f66b37cd40e7fSHA-256: 913da1b80378615b6796137ce2f3ad07f9242f45fbde81d1dcfd46076240fd65
chromium-browser-debuginfo-42.0.2311.90-1.el6_6.x86_64.rpm
    MD5: e040eec71806f69889e0106612926e6dSHA-256: 500269be7e2783dfde64b4be37c3629b2ff4f65dc1b43207e787434492bd2325
 
Red Hat Enterprise Linux Server Supplementary (v. 6)

SRPMS:
chromium-browser-42.0.2311.90-1.el6_6.src.rpm
    MD5: 49fe99b2d2fcefb5c46fc84655e02d27SHA-256: 854b6a9a22490fa19f916fbbced4acc7dd8a10d4bd73ce457a5d4e174faf3395
 
IA-32:
chromium-browser-42.0.2311.90-1.el6_6.i686.rpm
    MD5: 6e7fc3448c99aee89278d691e33ad170SHA-256: bf2718a1165e7be13f0f11824a5ba119c5d6e790be9b429c1b54a0bbfea22fdf
chromium-browser-debuginfo-42.0.2311.90-1.el6_6.i686.rpm
    MD5: 86aa3c7ede28baf5cf1b836017c87a96SHA-256: 5ef2b36a987ce40f97b24e9ad149c02548da214db416f09f214f8ea4d30b74c6
 
x86_64:
chromium-browser-42.0.2311.90-1.el6_6.x86_64.rpm
    MD5: db49c9e10015903beb3f66b37cd40e7fSHA-256: 913da1b80378615b6796137ce2f3ad07f9242f45fbde81d1dcfd46076240fd65
chromium-browser-debuginfo-42.0.2311.90-1.el6_6.x86_64.rpm
    MD5: e040eec71806f69889e0106612926e6dSHA-256: 500269be7e2783dfde64b4be37c3629b2ff4f65dc1b43207e787434492bd2325
 
Red Hat Enterprise Linux Server Supplementary EUS (v. 6.6.z)

SRPMS:
chromium-browser-42.0.2311.90-1.el6_6.src.rpm
    MD5: 49fe99b2d2fcefb5c46fc84655e02d27SHA-256: 854b6a9a22490fa19f916fbbced4acc7dd8a10d4bd73ce457a5d4e174faf3395
 
IA-32:
chromium-browser-42.0.2311.90-1.el6_6.i686.rpm
    MD5: 6e7fc3448c99aee89278d691e33ad170SHA-256: bf2718a1165e7be13f0f11824a5ba119c5d6e790be9b429c1b54a0bbfea22fdf
chromium-browser-debuginfo-42.0.2311.90-1.el6_6.i686.rpm
    MD5: 86aa3c7ede28baf5cf1b836017c87a96SHA-256: 5ef2b36a987ce40f97b24e9ad149c02548da214db416f09f214f8ea4d30b74c6
 
x86_64:
chromium-browser-42.0.2311.90-1.el6_6.x86_64.rpm
    MD5: db49c9e10015903beb3f66b37cd40e7fSHA-256: 913da1b80378615b6796137ce2f3ad07f9242f45fbde81d1dcfd46076240fd65
chromium-browser-debuginfo-42.0.2311.90-1.el6_6.x86_64.rpm
    MD5: e040eec71806f69889e0106612926e6dSHA-256: 500269be7e2783dfde64b4be37c3629b2ff4f65dc1b43207e787434492bd2325
 
Red Hat Enterprise Linux Workstation Supplementary (v. 6)

SRPMS:
chromium-browser-42.0.2311.90-1.el6_6.src.rpm
    MD5: 49fe99b2d2fcefb5c46fc84655e02d27SHA-256: 854b6a9a22490fa19f916fbbced4acc7dd8a10d4bd73ce457a5d4e174faf3395
 
IA-32:
chromium-browser-42.0.2311.90-1.el6_6.i686.rpm
    MD5: 6e7fc3448c99aee89278d691e33ad170SHA-256: bf2718a1165e7be13f0f11824a5ba119c5d6e790be9b429c1b54a0bbfea22fdf
chromium-browser-debuginfo-42.0.2311.90-1.el6_6.i686.rpm
    MD5: 86aa3c7ede28baf5cf1b836017c87a96SHA-256: 5ef2b36a987ce40f97b24e9ad149c02548da214db416f09f214f8ea4d30b74c6
 
x86_64:
chromium-browser-42.0.2311.90-1.el6_6.x86_64.rpm
    MD5: db49c9e10015903beb3f66b37cd40e7fSHA-256: 913da1b80378615b6796137ce2f3ad07f9242f45fbde81d1dcfd46076240fd65
chromium-browser-debuginfo-42.0.2311.90-1.el6_6.x86_64.rpm
    MD5: e040eec71806f69889e0106612926e6dSHA-256: 500269be7e2783dfde64b4be37c3629b2ff4f65dc1b43207e787434492bd2325
 
(The unlinked packages above are only available from the Red Hat Network)
1211919 – CVE-2015-1235 chromium-browser: Cross-origin-bypass in HTML parser1211920 – CVE-2015-1236 chromium-browser: Cross-origin-bypass in Blink1211921 – CVE-2015-1237 chromium-browser: Use-after-free in IPC1211922 – CVE-2015-1238 chromium-browser: Out-of-bounds write in Skia1211923 – CVE-2015-1240 chromium-browser: Out-of-bounds read in WebGL1211924 – CVE-2015-1241 chromium-browser: tap-jacking vulnerability1211925 – CVE-2015-1242 chromium-browser: Type confusion in V81211926 – CVE-2015-1244 chromium-browser: HSTS bypass in WebSockets1211927 – CVE-2015-1245 chromium-browser: Use-after-free in PDFium1211928 – CVE-2015-1246 chromium-browser: Out-of-bounds read in Blink1211929 – CVE-2015-1247 chromium-browser: Scheme issues in OpenSearch1211930 – CVE-2015-1248 chromium-browser: SafeBrowsing bypass1211932 – CVE-2015-1249 chromium-browser: Various fixes from internal audits, fuzzing and other initiatives

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply