An update for chromium-browser is now available for Red Hat Enterprise Linux 6Supplementary.Red Hat Product Security has rated this update as having a security impact ofImportant.

A Common Vulnerability Scoring System (CVSS) base score, which givesa detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
Chromium is an open-source web browser, powered by WebKit (Blink).This update upgrades Chromium to version 49.0.2623.108.Security Fix(es):Several flaws were found in the processing of malformed web content.

A web pagecontaining malicious content could cause Chromium to crash, execute arbitrarycode, or disclose sensitive information when visited by the victim.(CVE-2016-1646, CVE-2016-1647, CVE-2016-1648, CVE-2016-1649, CVE-2016-1650)
Red Hat Enterprise Linux Desktop Supplementary (v. 6)

IA-32:
chromium-browser-49.0.2623.108-1.el6.i686.rpm
    MD5: b58763b06459578947df77778908a10fSHA-256: c504c4d22ae965ff325bdc77ec1f8c68d6b5ad82650eed58fced67d6f2e46006
chromium-browser-debuginfo-49.0.2623.108-1.el6.i686.rpm
    MD5: f2ef83e1766c4cf30fa42c8031f6284fSHA-256: 9691ca86cd03ce089be23eed638d8ee03a96c446da2bcac3a993e758ae014d91
 
x86_64:
chromium-browser-49.0.2623.108-1.el6.x86_64.rpm
    MD5: 7e7891b1da142e06539c45af9786767cSHA-256: e89ad70afcf6b38061b97a6f2f81057b51486d57fe6ec4353b02712d6ed0ef44
chromium-browser-debuginfo-49.0.2623.108-1.el6.x86_64.rpm
    MD5: e6ad3d4d067531160fac7417a84a99cfSHA-256: 36859ba9b70a92bf9a7c3f6275412ebc7cb38ebee6dccc4aebc9f736deff36db
 
Red Hat Enterprise Linux Server Supplementary (v. 6)

IA-32:
chromium-browser-49.0.2623.108-1.el6.i686.rpm
    MD5: b58763b06459578947df77778908a10fSHA-256: c504c4d22ae965ff325bdc77ec1f8c68d6b5ad82650eed58fced67d6f2e46006
chromium-browser-debuginfo-49.0.2623.108-1.el6.i686.rpm
    MD5: f2ef83e1766c4cf30fa42c8031f6284fSHA-256: 9691ca86cd03ce089be23eed638d8ee03a96c446da2bcac3a993e758ae014d91
 
x86_64:
chromium-browser-49.0.2623.108-1.el6.x86_64.rpm
    MD5: 7e7891b1da142e06539c45af9786767cSHA-256: e89ad70afcf6b38061b97a6f2f81057b51486d57fe6ec4353b02712d6ed0ef44
chromium-browser-debuginfo-49.0.2623.108-1.el6.x86_64.rpm
    MD5: e6ad3d4d067531160fac7417a84a99cfSHA-256: 36859ba9b70a92bf9a7c3f6275412ebc7cb38ebee6dccc4aebc9f736deff36db
 
Red Hat Enterprise Linux Server Supplementary EUS (v. 6.7.z)

IA-32:
chromium-browser-49.0.2623.108-1.el6.i686.rpm
    MD5: b58763b06459578947df77778908a10fSHA-256: c504c4d22ae965ff325bdc77ec1f8c68d6b5ad82650eed58fced67d6f2e46006
chromium-browser-debuginfo-49.0.2623.108-1.el6.i686.rpm
    MD5: f2ef83e1766c4cf30fa42c8031f6284fSHA-256: 9691ca86cd03ce089be23eed638d8ee03a96c446da2bcac3a993e758ae014d91
 
x86_64:
chromium-browser-49.0.2623.108-1.el6.x86_64.rpm
    MD5: 7e7891b1da142e06539c45af9786767cSHA-256: e89ad70afcf6b38061b97a6f2f81057b51486d57fe6ec4353b02712d6ed0ef44
chromium-browser-debuginfo-49.0.2623.108-1.el6.x86_64.rpm
    MD5: e6ad3d4d067531160fac7417a84a99cfSHA-256: 36859ba9b70a92bf9a7c3f6275412ebc7cb38ebee6dccc4aebc9f736deff36db
 
Red Hat Enterprise Linux Workstation Supplementary (v. 6)

IA-32:
chromium-browser-49.0.2623.108-1.el6.i686.rpm
    MD5: b58763b06459578947df77778908a10fSHA-256: c504c4d22ae965ff325bdc77ec1f8c68d6b5ad82650eed58fced67d6f2e46006
chromium-browser-debuginfo-49.0.2623.108-1.el6.i686.rpm
    MD5: f2ef83e1766c4cf30fa42c8031f6284fSHA-256: 9691ca86cd03ce089be23eed638d8ee03a96c446da2bcac3a993e758ae014d91
 
x86_64:
chromium-browser-49.0.2623.108-1.el6.x86_64.rpm
    MD5: 7e7891b1da142e06539c45af9786767cSHA-256: e89ad70afcf6b38061b97a6f2f81057b51486d57fe6ec4353b02712d6ed0ef44
chromium-browser-debuginfo-49.0.2623.108-1.el6.x86_64.rpm
    MD5: e6ad3d4d067531160fac7417a84a99cfSHA-256: 36859ba9b70a92bf9a7c3f6275412ebc7cb38ebee6dccc4aebc9f736deff36db
 
(The unlinked packages above are only available from the Red Hat Network)

1321811 – CVE-2016-1646 chromium-browser: out-of-bounds read in V81321812 – CVE-2016-1647 chromium-browser: use-after-free in Navigation1321814 – CVE-2016-1648 chromium-browser: use-after-free in Extensions1321815 – CVE-2016-1649 chromium-browser: buffer overflow in libANGLE1321816 – CVE-2016-1650 chromium-browser: various fixes from internal audits

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from: