An update for chromium-browser is now available for Red Hat Enterprise Linux 6Supplementary.Red Hat Product Security has rated this update as having a security impact ofImportant.

A Common Vulnerability Scoring System (CVSS) base score, which givesa detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
Chromium is an open-source web browser, powered by WebKit (Blink).This update upgrades Chromium to version 53.0.2785.113.Security Fix(es):* Multiple flaws were found in the processing of malformed web content.

A webpage containing malicious content could cause Chromium to crash, executearbitrary code, or disclose sensitive information when visited by the victim.(CVE-2016-5170, CVE-2016-5171, CVE-2016-5175, CVE-2016-5172, CVE-2016-5173,CVE-2016-5174)
For details on how to apply this update, which includes the changes described inthis advisory, refer to:https://access.redhat.com/articles/11258After installing the update, Chromium must be restarted for the changes to takeeffect.Red Hat Enterprise Linux Desktop Supplementary (v. 6)

IA-32:
chromium-browser-53.0.2785.113-1.el6.i686.rpm
    MD5: bc3fcf395d5cf8028cc3b483150a5965SHA-256: 0ccd9b9b51b759673711a55b5f3c73f4b992adf4c0a8ff637f0df529a14108f8
chromium-browser-debuginfo-53.0.2785.113-1.el6.i686.rpm
    MD5: 40d02b929351730ce6454f09605a4c79SHA-256: fac0fb35536c6d6faf12dd4c5b85a4ff4a43ab43b37e9aab64142bb165a1c33a
 
x86_64:
chromium-browser-53.0.2785.113-1.el6.x86_64.rpm
    MD5: 5b5c23204d495a93ffde3c715b9bffdeSHA-256: 5001c58967a7679aa765f218d8641c331555cb92e8e487f5fcb0efb7755fd92b
chromium-browser-debuginfo-53.0.2785.113-1.el6.x86_64.rpm
    MD5: bd248eee57035441290e76ee56390070SHA-256: b30e2610ad8912c430abf793c5cd309101dbae413537b587c625dbbfae29089b
 
Red Hat Enterprise Linux Server Supplementary (v. 6)

IA-32:
chromium-browser-53.0.2785.113-1.el6.i686.rpm
    MD5: bc3fcf395d5cf8028cc3b483150a5965SHA-256: 0ccd9b9b51b759673711a55b5f3c73f4b992adf4c0a8ff637f0df529a14108f8
chromium-browser-debuginfo-53.0.2785.113-1.el6.i686.rpm
    MD5: 40d02b929351730ce6454f09605a4c79SHA-256: fac0fb35536c6d6faf12dd4c5b85a4ff4a43ab43b37e9aab64142bb165a1c33a
 
x86_64:
chromium-browser-53.0.2785.113-1.el6.x86_64.rpm
    MD5: 5b5c23204d495a93ffde3c715b9bffdeSHA-256: 5001c58967a7679aa765f218d8641c331555cb92e8e487f5fcb0efb7755fd92b
chromium-browser-debuginfo-53.0.2785.113-1.el6.x86_64.rpm
    MD5: bd248eee57035441290e76ee56390070SHA-256: b30e2610ad8912c430abf793c5cd309101dbae413537b587c625dbbfae29089b
 
Red Hat Enterprise Linux Workstation Supplementary (v. 6)

IA-32:
chromium-browser-53.0.2785.113-1.el6.i686.rpm
    MD5: bc3fcf395d5cf8028cc3b483150a5965SHA-256: 0ccd9b9b51b759673711a55b5f3c73f4b992adf4c0a8ff637f0df529a14108f8
chromium-browser-debuginfo-53.0.2785.113-1.el6.i686.rpm
    MD5: 40d02b929351730ce6454f09605a4c79SHA-256: fac0fb35536c6d6faf12dd4c5b85a4ff4a43ab43b37e9aab64142bb165a1c33a
 
x86_64:
chromium-browser-53.0.2785.113-1.el6.x86_64.rpm
    MD5: 5b5c23204d495a93ffde3c715b9bffdeSHA-256: 5001c58967a7679aa765f218d8641c331555cb92e8e487f5fcb0efb7755fd92b
chromium-browser-debuginfo-53.0.2785.113-1.el6.x86_64.rpm
    MD5: bd248eee57035441290e76ee56390070SHA-256: b30e2610ad8912c430abf793c5cd309101dbae413537b587c625dbbfae29089b
 
(The unlinked packages above are only available from the Red Hat Network)

1375863 – CVE-2016-5170 chromium-browser: use after free in blink1375864 – CVE-2016-5171 chromium-browser: use after free in blink1375865 – CVE-2016-5172 chromium-browser: arbitrary memory read in v81375866 – CVE-2016-5173 chromium-browser: extension resource access1375867 – CVE-2016-5174 chromium-browser: popup not correctly suppressed1375868 – CVE-2016-5175 chromium-browser: various fixes from internal audits

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

Leave a Reply