An update for chromium-browser is now available for Red Hat Enterprise Linux 6Supplementary.Red Hat Product Security has rated this update as having a security impact ofImportant.

A Common Vulnerability Scoring System (CVSS) base score, which givesa detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

Chromium is an open-source web browser, powered by WebKit (Blink).This update upgrades Chromium to version 50.0.2661.102.Security Fix(es):* Multiple flaws were found in the processing of malformed web content.

A webpage containing malicious content could cause Chromium to crash, executearbitrary code, or disclose sensitive information when visited by the victim.(CVE-2016-1667, CVE-2016-1668, CVE-2016-1669, CVE-2016-1670)
For details on how to apply this update, which includes the changes described inthis advisory, refer to:https://access.redhat.com/articles/11258After installing the update, Chromium must be restarted for the changes to takeeffect.Red Hat Enterprise Linux Desktop Supplementary (v. 6)

IA-32:
chromium-browser-50.0.2661.102-1.el6.i686.rpm
    MD5: f572490719826b82f157347a8de201d3SHA-256: b145b8031f8cd54d5caab094384f1b196be5939eb1083019b943045afb65ccce
chromium-browser-debuginfo-50.0.2661.102-1.el6.i686.rpm
    MD5: 56adcc344700aeea5564783c6c91c399SHA-256: d14677f42f2d2ade8ef204a776760da535869552f9ec54f7878890d87698082a
 
x86_64:
chromium-browser-50.0.2661.102-1.el6.x86_64.rpm
    MD5: 8aff040d37444b83c715cc8bd3cbef71SHA-256: 29312c39c915b68a7217ced4f80f9657486f41e2306766518e12739a6e0f7790
chromium-browser-debuginfo-50.0.2661.102-1.el6.x86_64.rpm
    MD5: 668371eb4827fcd014a30c5c5e00ee8dSHA-256: 2845dfab7d1cefdcc27907592d4e565d0ed9257eb8c392196d3322cabfb855a5
 
Red Hat Enterprise Linux Server Supplementary (v. 6)

IA-32:
chromium-browser-50.0.2661.102-1.el6.i686.rpm
    MD5: f572490719826b82f157347a8de201d3SHA-256: b145b8031f8cd54d5caab094384f1b196be5939eb1083019b943045afb65ccce
chromium-browser-debuginfo-50.0.2661.102-1.el6.i686.rpm
    MD5: 56adcc344700aeea5564783c6c91c399SHA-256: d14677f42f2d2ade8ef204a776760da535869552f9ec54f7878890d87698082a
 
x86_64:
chromium-browser-50.0.2661.102-1.el6.x86_64.rpm
    MD5: 8aff040d37444b83c715cc8bd3cbef71SHA-256: 29312c39c915b68a7217ced4f80f9657486f41e2306766518e12739a6e0f7790
chromium-browser-debuginfo-50.0.2661.102-1.el6.x86_64.rpm
    MD5: 668371eb4827fcd014a30c5c5e00ee8dSHA-256: 2845dfab7d1cefdcc27907592d4e565d0ed9257eb8c392196d3322cabfb855a5
 
Red Hat Enterprise Linux Workstation Supplementary (v. 6)

IA-32:
chromium-browser-50.0.2661.102-1.el6.i686.rpm
    MD5: f572490719826b82f157347a8de201d3SHA-256: b145b8031f8cd54d5caab094384f1b196be5939eb1083019b943045afb65ccce
chromium-browser-debuginfo-50.0.2661.102-1.el6.i686.rpm
    MD5: 56adcc344700aeea5564783c6c91c399SHA-256: d14677f42f2d2ade8ef204a776760da535869552f9ec54f7878890d87698082a
 
x86_64:
chromium-browser-50.0.2661.102-1.el6.x86_64.rpm
    MD5: 8aff040d37444b83c715cc8bd3cbef71SHA-256: 29312c39c915b68a7217ced4f80f9657486f41e2306766518e12739a6e0f7790
chromium-browser-debuginfo-50.0.2661.102-1.el6.x86_64.rpm
    MD5: 668371eb4827fcd014a30c5c5e00ee8dSHA-256: 2845dfab7d1cefdcc27907592d4e565d0ed9257eb8c392196d3322cabfb855a5
 
(The unlinked packages above are only available from the Red Hat Network)
1335447 – CVE-2016-1667 chromium-browser: same origin bypass in dom1335448 – CVE-2016-1668 chromium-browser: same origin bypass in blink v8 bindings1335449 – CVE-2016-1669 chromium-browser: buffer overflow in v81335450 – CVE-2016-1670 chromium-browser: race condition in loader

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from: