Updated chromium-browser packages that fix multiple security issues are nowavailable for Red Hat Enterprise Linux 6 Supplementary.Red Hat Product Security has rated this update as having Important securityimpact. Common Vulnerability Scoring System (CVSS) base scores, which givedetailed severity ratings, are available for each vulnerability from theCVE links in the References section.

Chromium is an open-source web browser, powered by WebKit (Blink).Several flaws were found in the processing of malformed web content. A webpage containing malicious content could cause Chromium to crash or,potentially, execute arbitrary code with the privileges of the user runningChromium. (CVE-2015-1266, CVE-2015-1267, CVE-2015-1268, CVE-2015-1269)All Chromium users should upgrade to these updated packages, which containChromium version 43.0.2357.130, which corrects these issues. Afterinstalling the update, Chromium must be restarted for the changes to takeeffect.
Before applying this update, make sure all previously released erratarelevant to your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258Red Hat Enterprise Linux Desktop Supplementary (v. 6)

IA-32:
chromium-browser-43.0.2357.130-1.el6_6.i686.rpm
    MD5: 226fdb3b3f210ce6be5c9816c698f4f6SHA-256: 579edb5f93de6d94279fb2c0683e6d057b4fde9432aa1874caee97d033f1020e
chromium-browser-debuginfo-43.0.2357.130-1.el6_6.i686.rpm
    MD5: 25d5ec3afa7d12ce1ca3e58b68e9b2b6SHA-256: 57efe9295923c5045286ce470f4c949de14d0803817f0cdfbe6b1c3bce6357e1
 
x86_64:
chromium-browser-43.0.2357.130-1.el6_6.x86_64.rpm
    MD5: 9c5d98d2424877e32632f80a9f60982aSHA-256: e906adb9adeb7d75cc3d5f6f76a0369e89747177efb784cc62fca98c50f315bc
chromium-browser-debuginfo-43.0.2357.130-1.el6_6.x86_64.rpm
    MD5: a5411cc4a6213b6889ebbe63790ca446SHA-256: 5f8fffb2cce9d2b8765c2fc024dda5b6fda245a105d1c0e666354b5b09524dbf
 
Red Hat Enterprise Linux Server Supplementary (v. 6)

IA-32:
chromium-browser-43.0.2357.130-1.el6_6.i686.rpm
    MD5: 226fdb3b3f210ce6be5c9816c698f4f6SHA-256: 579edb5f93de6d94279fb2c0683e6d057b4fde9432aa1874caee97d033f1020e
chromium-browser-debuginfo-43.0.2357.130-1.el6_6.i686.rpm
    MD5: 25d5ec3afa7d12ce1ca3e58b68e9b2b6SHA-256: 57efe9295923c5045286ce470f4c949de14d0803817f0cdfbe6b1c3bce6357e1
 
x86_64:
chromium-browser-43.0.2357.130-1.el6_6.x86_64.rpm
    MD5: 9c5d98d2424877e32632f80a9f60982aSHA-256: e906adb9adeb7d75cc3d5f6f76a0369e89747177efb784cc62fca98c50f315bc
chromium-browser-debuginfo-43.0.2357.130-1.el6_6.x86_64.rpm
    MD5: a5411cc4a6213b6889ebbe63790ca446SHA-256: 5f8fffb2cce9d2b8765c2fc024dda5b6fda245a105d1c0e666354b5b09524dbf
 
Red Hat Enterprise Linux Server Supplementary EUS (v. 6.6.z)

IA-32:
chromium-browser-43.0.2357.130-1.el6_6.i686.rpm
    MD5: 226fdb3b3f210ce6be5c9816c698f4f6SHA-256: 579edb5f93de6d94279fb2c0683e6d057b4fde9432aa1874caee97d033f1020e
chromium-browser-debuginfo-43.0.2357.130-1.el6_6.i686.rpm
    MD5: 25d5ec3afa7d12ce1ca3e58b68e9b2b6SHA-256: 57efe9295923c5045286ce470f4c949de14d0803817f0cdfbe6b1c3bce6357e1
 
x86_64:
chromium-browser-43.0.2357.130-1.el6_6.x86_64.rpm
    MD5: 9c5d98d2424877e32632f80a9f60982aSHA-256: e906adb9adeb7d75cc3d5f6f76a0369e89747177efb784cc62fca98c50f315bc
chromium-browser-debuginfo-43.0.2357.130-1.el6_6.x86_64.rpm
    MD5: a5411cc4a6213b6889ebbe63790ca446SHA-256: 5f8fffb2cce9d2b8765c2fc024dda5b6fda245a105d1c0e666354b5b09524dbf
 
Red Hat Enterprise Linux Workstation Supplementary (v. 6)

IA-32:
chromium-browser-43.0.2357.130-1.el6_6.i686.rpm
    MD5: 226fdb3b3f210ce6be5c9816c698f4f6SHA-256: 579edb5f93de6d94279fb2c0683e6d057b4fde9432aa1874caee97d033f1020e
chromium-browser-debuginfo-43.0.2357.130-1.el6_6.i686.rpm
    MD5: 25d5ec3afa7d12ce1ca3e58b68e9b2b6SHA-256: 57efe9295923c5045286ce470f4c949de14d0803817f0cdfbe6b1c3bce6357e1
 
x86_64:
chromium-browser-43.0.2357.130-1.el6_6.x86_64.rpm
    MD5: 9c5d98d2424877e32632f80a9f60982aSHA-256: e906adb9adeb7d75cc3d5f6f76a0369e89747177efb784cc62fca98c50f315bc
chromium-browser-debuginfo-43.0.2357.130-1.el6_6.x86_64.rpm
    MD5: a5411cc4a6213b6889ebbe63790ca446SHA-256: 5f8fffb2cce9d2b8765c2fc024dda5b6fda245a105d1c0e666354b5b09524dbf
 
(The unlinked packages above are only available from the Red Hat Network)
1234696 – CVE-2015-1266 chromium-browser: Scheme validation error in WebUI1234697 – CVE-2015-1268 chromium-browser: Cross-origin bypass in Blink1234698 – CVE-2015-1267 chromium-browser: Cross-origin bypass in Blink1234699 – CVE-2015-1269 chromium-browser: Normalization error in HSTS/HPKP preload list

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply