-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2016.0192
                Important: chromium-browser security update
                              28 January 2016

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           chromium-browser
Publisher:         Red Hat
Operating System:  Red Hat Enterprise Linux Server 6
                   Red Hat Enterprise Linux WS/Desktop 6
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Denial of Service               -- Remote with User Interaction
                   Access Confidential Data        -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2016-2052 CVE-2016-2051 CVE-2016-1620
                   CVE-2016-1619 CVE-2016-1618 CVE-2016-1617
                   CVE-2016-1616 CVE-2016-1615 CVE-2016-1614
                   CVE-2016-1613 CVE-2016-1612 

Reference:         ASB-2016.0005

Original Bulletin: 
   https://rhn.redhat.com/errata/RHSA-2016-0072.html

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: chromium-browser security update
Advisory ID:       RHSA-2016:0072-01
Product:           Red Hat Enterprise Linux Supplementary
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2016-0072.html
Issue date:        2016-01-27
CVE Names:         CVE-2016-1612 CVE-2016-1613 CVE-2016-1614 
                   CVE-2016-1615 CVE-2016-1616 CVE-2016-1617 
                   CVE-2016-1618 CVE-2016-1619 CVE-2016-1620 
                   CVE-2016-2051 CVE-2016-2052 
=====================================================================

1. Summary:

Updated chromium-browser packages that fix multiple security issues are now
available for Red Hat Enterprise Linux 6 Supplementary.

Red Hat Product Security has rated this update as having Important security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64

3. Description:

Chromium is an open-source web browser, powered by WebKit (Blink).

Several flaws were found in the processing of malformed web content. A web
page containing malicious content could cause Chromium to crash, execute
arbitrary code, or disclose sensitive information when visited by the
victim. (CVE-2016-1612, CVE-2016-1613, CVE-2016-1614, CVE-2016-1615,
CVE-2016-1616, CVE-2016-1617, CVE-2016-1618, CVE-2016-1619, CVE-2016-1620,
CVE-2016-2051, CVE-2016-2052)

All Chromium users should upgrade to these updated packages, which
contain Chromium version 48.0.2564.82, which corrects these issues.
After installing the update, Chromium must be restarted for the changes
to take effect.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1300988 - CVE-2016-1612 chromium-browser: bad cast in V8
1300989 - CVE-2016-1613 chromium-browser: use-after-free in PDFium
1300990 - CVE-2016-1614 chromium-browser: information leak in Blink
1300991 - CVE-2016-1615 chromium-browser: origin confusion in Omnibox
1300992 - CVE-2016-1616 chromium-browser: various fixes from internal audits
1300993 - CVE-2016-1617 chromium-browser: various fixes from internal audits
1300994 - CVE-2016-1618 chromium-browser: weak random number generator in Blink
1300995 - CVE-2016-1619 chromium-browser: out-of-bounds read in PDFium
1300996 - CVE-2016-1620 chromium-browser: various fixes from internal audits
1301550 - CVE-2016-2051 chromium-browser: Multiple unspecified vulnerabilities in Google V8 before 4.8.271.17
1301553 - CVE-2016-2052 chromium-browser: Multiple unspecified vulnerabilities in HarfBuzz before 1.0.6

6. Package List:

Red Hat Enterprise Linux Desktop Supplementary (v. 6):

i386:
chromium-browser-48.0.2564.82-1.el6.i686.rpm
chromium-browser-debuginfo-48.0.2564.82-1.el6.i686.rpm

x86_64:
chromium-browser-48.0.2564.82-1.el6.x86_64.rpm
chromium-browser-debuginfo-48.0.2564.82-1.el6.x86_64.rpm

Red Hat Enterprise Linux Server Supplementary (v. 6):

i386:
chromium-browser-48.0.2564.82-1.el6.i686.rpm
chromium-browser-debuginfo-48.0.2564.82-1.el6.i686.rpm

x86_64:
chromium-browser-48.0.2564.82-1.el6.x86_64.rpm
chromium-browser-debuginfo-48.0.2564.82-1.el6.x86_64.rpm

Red Hat Enterprise Linux Workstation Supplementary (v. 6):

i386:
chromium-browser-48.0.2564.82-1.el6.i686.rpm
chromium-browser-debuginfo-48.0.2564.82-1.el6.i686.rpm

x86_64:
chromium-browser-48.0.2564.82-1.el6.x86_64.rpm
chromium-browser-debuginfo-48.0.2564.82-1.el6.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2016-1612
https://access.redhat.com/security/cve/CVE-2016-1613
https://access.redhat.com/security/cve/CVE-2016-1614
https://access.redhat.com/security/cve/CVE-2016-1615
https://access.redhat.com/security/cve/CVE-2016-1616
https://access.redhat.com/security/cve/CVE-2016-1617
https://access.redhat.com/security/cve/CVE-2016-1618
https://access.redhat.com/security/cve/CVE-2016-1619
https://access.redhat.com/security/cve/CVE-2016-1620
https://access.redhat.com/security/cve/CVE-2016-2051
https://access.redhat.com/security/cve/CVE-2016-2052
https://access.redhat.com/security/updates/classification/#important
http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2016 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iD8DBQFWqMLRXlSAg2UNWIIRAmSjAKCHP3nhqlg1S9T2FG/XUBzWkRgo+gCgkuKC
5+uk/nmhpPVc7LntGlLVFFM=
=T0Mv
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=vQ/5
-----END PGP SIGNATURE-----