Updated chromium-browser packages that fix multiple security issues are nowavailable for Red Hat Enterprise Linux 6 Supplementary.Red Hat Product Security has rated this update as having Important securityimpact.

Common Vulnerability Scoring System (CVSS) base scores, which givedetailed severity ratings, are available for each vulnerability from theCVE links in the References section.
Chromium is an open-source web browser, powered by WebKit (Blink).Several flaws were found in the processing of malformed web content.

A webpage containing malicious content could cause Chromium to crash, executearbitrary code, or disclose sensitive information when visited by thevictim. (CVE-2016-1630, CVE-2016-1631, CVE-2016-1632, CVE-2016-1633,CVE-2016-1634, CVE-2016-1635, CVE-2016-1636, CVE-2016-1637, CVE-2016-1638,CVE-2016-1639, CVE-2016-1640, CVE-2016-1641, CVE-2016-1642)All Chromium users should upgrade to these updated packages, whichcontain Chromium version 49.0.2623.75, which corrects these issues.After installing the update, Chromium must be restarted for the changesto take effect.
Before applying this update, make sure all previously released erratarelevant to your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258Red Hat Enterprise Linux Desktop Supplementary (v. 6)

IA-32:
chromium-browser-49.0.2623.75-1.el6.i686.rpm
    MD5: 267cab2b6d22958d0f50d49821f5ab88SHA-256: 5a3c2f5d25f061a4a5408de4c701c71309d5b57217d6d90b422cae66af92762c
chromium-browser-debuginfo-49.0.2623.75-1.el6.i686.rpm
    MD5: 3d98755969663fdf3420527081ffebacSHA-256: aae4bf3c6daa3da992449d2896de78102cd21c2c1db78b69ef5344bea8fa4b34
 
x86_64:
chromium-browser-49.0.2623.75-1.el6.x86_64.rpm
    MD5: b81d1aac5a429c38970e20e8286bfb23SHA-256: ae3d3c1deeac4a0fdad14c9c4d88a58b2ccd3809c2f0d44259ae244705caa232
chromium-browser-debuginfo-49.0.2623.75-1.el6.x86_64.rpm
    MD5: 4020df0e4764c1931e29e6c2e08ebe3cSHA-256: 8b49ffa212b4af02f2b2bd55d36b7b010d7d122167286e584914ed7979fd55b0
 
Red Hat Enterprise Linux Server Supplementary (v. 6)

IA-32:
chromium-browser-49.0.2623.75-1.el6.i686.rpm
    MD5: 267cab2b6d22958d0f50d49821f5ab88SHA-256: 5a3c2f5d25f061a4a5408de4c701c71309d5b57217d6d90b422cae66af92762c
chromium-browser-debuginfo-49.0.2623.75-1.el6.i686.rpm
    MD5: 3d98755969663fdf3420527081ffebacSHA-256: aae4bf3c6daa3da992449d2896de78102cd21c2c1db78b69ef5344bea8fa4b34
 
x86_64:
chromium-browser-49.0.2623.75-1.el6.x86_64.rpm
    MD5: b81d1aac5a429c38970e20e8286bfb23SHA-256: ae3d3c1deeac4a0fdad14c9c4d88a58b2ccd3809c2f0d44259ae244705caa232
chromium-browser-debuginfo-49.0.2623.75-1.el6.x86_64.rpm
    MD5: 4020df0e4764c1931e29e6c2e08ebe3cSHA-256: 8b49ffa212b4af02f2b2bd55d36b7b010d7d122167286e584914ed7979fd55b0
 
Red Hat Enterprise Linux Server Supplementary EUS (v. 6.7.z)

IA-32:
chromium-browser-49.0.2623.75-1.el6.i686.rpm
    MD5: 267cab2b6d22958d0f50d49821f5ab88SHA-256: 5a3c2f5d25f061a4a5408de4c701c71309d5b57217d6d90b422cae66af92762c
chromium-browser-debuginfo-49.0.2623.75-1.el6.i686.rpm
    MD5: 3d98755969663fdf3420527081ffebacSHA-256: aae4bf3c6daa3da992449d2896de78102cd21c2c1db78b69ef5344bea8fa4b34
 
x86_64:
chromium-browser-49.0.2623.75-1.el6.x86_64.rpm
    MD5: b81d1aac5a429c38970e20e8286bfb23SHA-256: ae3d3c1deeac4a0fdad14c9c4d88a58b2ccd3809c2f0d44259ae244705caa232
chromium-browser-debuginfo-49.0.2623.75-1.el6.x86_64.rpm
    MD5: 4020df0e4764c1931e29e6c2e08ebe3cSHA-256: 8b49ffa212b4af02f2b2bd55d36b7b010d7d122167286e584914ed7979fd55b0
 
Red Hat Enterprise Linux Workstation Supplementary (v. 6)

IA-32:
chromium-browser-49.0.2623.75-1.el6.i686.rpm
    MD5: 267cab2b6d22958d0f50d49821f5ab88SHA-256: 5a3c2f5d25f061a4a5408de4c701c71309d5b57217d6d90b422cae66af92762c
chromium-browser-debuginfo-49.0.2623.75-1.el6.i686.rpm
    MD5: 3d98755969663fdf3420527081ffebacSHA-256: aae4bf3c6daa3da992449d2896de78102cd21c2c1db78b69ef5344bea8fa4b34
 
x86_64:
chromium-browser-49.0.2623.75-1.el6.x86_64.rpm
    MD5: b81d1aac5a429c38970e20e8286bfb23SHA-256: ae3d3c1deeac4a0fdad14c9c4d88a58b2ccd3809c2f0d44259ae244705caa232
chromium-browser-debuginfo-49.0.2623.75-1.el6.x86_64.rpm
    MD5: 4020df0e4764c1931e29e6c2e08ebe3cSHA-256: 8b49ffa212b4af02f2b2bd55d36b7b010d7d122167286e584914ed7979fd55b0
 
(The unlinked packages above are only available from the Red Hat Network)

1314214 – CVE-2016-1630 chromium-browser: same-origin bypass in Blink1314215 – CVE-2016-1631 chromium-browser: same-origin bypass in Pepper Plugin1314216 – CVE-2016-1632 chromium-browser: bad cast in Extensions1314217 – CVE-2016-1633 chromium-browser: use-after-free in Blink1314218 – CVE-2016-1634 chromium-browser: use-after-free in Blink1314219 – CVE-2016-1635 chromium-browser: use-after-free in Blink1314220 – CVE-2016-1636 chromium-browser: SRI Validation Bypass1314221 – CVE-2016-1637 chromium-browser: information leak in Skia1314222 – CVE-2016-1638 chromium-browser: WebAPI Bypass1314224 – CVE-2016-1639 chromium-browser: use-after-free in WebRTC1314225 – CVE-2016-1640 chromium-browser: origin confusion in Extensions UI1314226 – CVE-2016-1641 chromium-browser: use-after-free in Favicon1314227 – CVE-2016-1642 chromium-browser: various fixes from internal audits

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from: