An update for chromium-browser is now available for Red Hat Enterprise Linux 6Supplementary.Red Hat Product Security has rated this update as having a security impact ofImportant.

A Common Vulnerability Scoring System (CVSS) base score, which givesa detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
Chromium is an open-source web browser, powered by WebKit (Blink).This update upgrades Chromium to version 51.0.2704.79.Security Fix(es):* Multiple flaws were found in the processing of malformed web content.

A webpage containing malicious content could cause Chromium to crash, executearbitrary code, or disclose sensitive information when visited by the victim.(CVE-2016-1696, CVE-2016-1697, CVE-2016-1703, CVE-2016-1698, CVE-2016-1699,CVE-2016-1700, CVE-2016-1701, CVE-2016-1702)
For details on how to apply this update, which includes the changes described inthis advisory, refer to:https://access.redhat.com/articles/11258After installing the update, Chromium must be restarted for the changes to takeeffect.Red Hat Enterprise Linux Desktop Supplementary (v. 6)

IA-32:
chromium-browser-51.0.2704.79-1.el6.i686.rpm
    MD5: 9bab204c1eb4a3f58cbc29734b39d978SHA-256: d7a8b7642c79fb120a7e27069c6e11396910f4336212d2fc96f6484611308bd9
chromium-browser-debuginfo-51.0.2704.79-1.el6.i686.rpm
    MD5: 56c1a807022e2aef34b4e8dd6ea3d6ceSHA-256: 3aa94529ac1eda38fecae71a44066dec34efefaf5b0a650aab8e85de588eac17
 
x86_64:
chromium-browser-51.0.2704.79-1.el6.x86_64.rpm
    MD5: 1fde64a56725097c87e1e1dc8f64e98dSHA-256: d48a0a614f010aeb9582b34aa3dcce5fdbe68408079220f09ab03ecf6a1f33fb
chromium-browser-debuginfo-51.0.2704.79-1.el6.x86_64.rpm
    MD5: 642a6fbe67265acffef0aafe7f37bad8SHA-256: 65dfaf33c5e9fc7e25be3c47ff54a4966f1a77ddbfe7778f5008a4e9d0c9a83b
 
Red Hat Enterprise Linux Server Supplementary (v. 6)

IA-32:
chromium-browser-51.0.2704.79-1.el6.i686.rpm
    MD5: 9bab204c1eb4a3f58cbc29734b39d978SHA-256: d7a8b7642c79fb120a7e27069c6e11396910f4336212d2fc96f6484611308bd9
chromium-browser-debuginfo-51.0.2704.79-1.el6.i686.rpm
    MD5: 56c1a807022e2aef34b4e8dd6ea3d6ceSHA-256: 3aa94529ac1eda38fecae71a44066dec34efefaf5b0a650aab8e85de588eac17
 
x86_64:
chromium-browser-51.0.2704.79-1.el6.x86_64.rpm
    MD5: 1fde64a56725097c87e1e1dc8f64e98dSHA-256: d48a0a614f010aeb9582b34aa3dcce5fdbe68408079220f09ab03ecf6a1f33fb
chromium-browser-debuginfo-51.0.2704.79-1.el6.x86_64.rpm
    MD5: 642a6fbe67265acffef0aafe7f37bad8SHA-256: 65dfaf33c5e9fc7e25be3c47ff54a4966f1a77ddbfe7778f5008a4e9d0c9a83b
 
Red Hat Enterprise Linux Workstation Supplementary (v. 6)

IA-32:
chromium-browser-51.0.2704.79-1.el6.i686.rpm
    MD5: 9bab204c1eb4a3f58cbc29734b39d978SHA-256: d7a8b7642c79fb120a7e27069c6e11396910f4336212d2fc96f6484611308bd9
chromium-browser-debuginfo-51.0.2704.79-1.el6.i686.rpm
    MD5: 56c1a807022e2aef34b4e8dd6ea3d6ceSHA-256: 3aa94529ac1eda38fecae71a44066dec34efefaf5b0a650aab8e85de588eac17
 
x86_64:
chromium-browser-51.0.2704.79-1.el6.x86_64.rpm
    MD5: 1fde64a56725097c87e1e1dc8f64e98dSHA-256: d48a0a614f010aeb9582b34aa3dcce5fdbe68408079220f09ab03ecf6a1f33fb
chromium-browser-debuginfo-51.0.2704.79-1.el6.x86_64.rpm
    MD5: 642a6fbe67265acffef0aafe7f37bad8SHA-256: 65dfaf33c5e9fc7e25be3c47ff54a4966f1a77ddbfe7778f5008a4e9d0c9a83b
 
(The unlinked packages above are only available from the Red Hat Network)

1342001 – CVE-2016-1696 chromium-browser: cross-origin bypass in extension bindings1342002 – CVE-2016-1697 chromium-browser: cross-origin bypass in blink1342003 – CVE-2016-1698 chromium-browser: information leak in extension bindings1342004 – CVE-2016-1699 chromium-browser: parameter sanitization failure in devtools1342005 – CVE-2016-1700 chromium-browser: use-after-free in extensions1342007 – CVE-2016-1701 chromium-browser: use-after-free in autofill1342008 – CVE-2016-1702 chromium-browser: out-of-bounds read in skia1342009 – CVE-2016-1703 chromium-browser: various fixes from internal audits

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from: