Updated chromium-browser packages that fix two security issues are nowavailable for Red Hat Enterprise Linux 6 Supplementary.Red Hat Product Security has rated this update as having Critical securityimpact.

Common Vulnerability Scoring System (CVSS) base scores, which givedetailed severity ratings, are available for each vulnerability from theCVE links in the References section.
Chromium is an open-source web browser, powered by WebKit (Blink).Two flaws were found in the processing of malformed web content.

A web pagecontaining malicious content could cause Chromium to crash, executearbitrary code, or disclose sensitive information when visited by thevictim. (CVE-2016-1629)All Chromium users should upgrade to these updated packages, whichcontain Chromium version 48.0.2564.116, which corrects these issues.After installing the update, Chromium must be restarted for the changesto take effect.
Before applying this update, make sure all previously released erratarelevant to your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258Red Hat Enterprise Linux Server Supplementary (v. 6)

IA-32:
chromium-browser-48.0.2564.116-1.el6.i686.rpm
    MD5: 369acb5b42f462b752158cca1bdee949SHA-256: b4c4f967d92c24f3cb31b2b948886bc22e480a334ad07511d195ea3653093ac1
chromium-browser-debuginfo-48.0.2564.116-1.el6.i686.rpm
    MD5: 3a95ea39885b6216c4d1e3ee580e64bdSHA-256: de64ecd9291bd57e78c737f3356f33ae1a345e24e11a2cf281bbce5eab08b9d4
 
x86_64:
chromium-browser-48.0.2564.116-1.el6.x86_64.rpm
    MD5: cc2de01a530918913b78927e58d47309SHA-256: 2b776a1e49bb5e4fdcbd342568358dae8fcd7a757ffb2530b54441c2ad59b568
chromium-browser-debuginfo-48.0.2564.116-1.el6.x86_64.rpm
    MD5: 32797e1370b12e2e9d06b087f9e2823cSHA-256: f6daade2dc0995be4bc2b8b0a8cafcadb858669e4ae9d4e50c57116b6efafafc
 
Red Hat Enterprise Linux Server Supplementary EUS (v. 6.7.z)

IA-32:
chromium-browser-48.0.2564.116-1.el6.i686.rpm
    MD5: 369acb5b42f462b752158cca1bdee949SHA-256: b4c4f967d92c24f3cb31b2b948886bc22e480a334ad07511d195ea3653093ac1
chromium-browser-debuginfo-48.0.2564.116-1.el6.i686.rpm
    MD5: 3a95ea39885b6216c4d1e3ee580e64bdSHA-256: de64ecd9291bd57e78c737f3356f33ae1a345e24e11a2cf281bbce5eab08b9d4
 
x86_64:
chromium-browser-48.0.2564.116-1.el6.x86_64.rpm
    MD5: cc2de01a530918913b78927e58d47309SHA-256: 2b776a1e49bb5e4fdcbd342568358dae8fcd7a757ffb2530b54441c2ad59b568
chromium-browser-debuginfo-48.0.2564.116-1.el6.x86_64.rpm
    MD5: 32797e1370b12e2e9d06b087f9e2823cSHA-256: f6daade2dc0995be4bc2b8b0a8cafcadb858669e4ae9d4e50c57116b6efafafc
 
Red Hat Enterprise Linux Workstation Supplementary (v. 6)

IA-32:
chromium-browser-48.0.2564.116-1.el6.i686.rpm
    MD5: 369acb5b42f462b752158cca1bdee949SHA-256: b4c4f967d92c24f3cb31b2b948886bc22e480a334ad07511d195ea3653093ac1
chromium-browser-debuginfo-48.0.2564.116-1.el6.i686.rpm
    MD5: 3a95ea39885b6216c4d1e3ee580e64bdSHA-256: de64ecd9291bd57e78c737f3356f33ae1a345e24e11a2cf281bbce5eab08b9d4
 
x86_64:
chromium-browser-48.0.2564.116-1.el6.x86_64.rpm
    MD5: cc2de01a530918913b78927e58d47309SHA-256: 2b776a1e49bb5e4fdcbd342568358dae8fcd7a757ffb2530b54441c2ad59b568
chromium-browser-debuginfo-48.0.2564.116-1.el6.x86_64.rpm
    MD5: 32797e1370b12e2e9d06b087f9e2823cSHA-256: f6daade2dc0995be4bc2b8b0a8cafcadb858669e4ae9d4e50c57116b6efafafc
 
(The unlinked packages above are only available from the Red Hat Network)

1309988 – CVE-2016-1629 chromium-browser: same-origin bypass in Blink and Sandbox escape in Chrome

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from: