Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2016.1386 Important: chromium-browser security update 2 June 2016 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: chromium-browser Publisher: Red Hat Operating System: Red Hat Enterprise Linux Server 6 Red Hat Enterprise Linux WS/Desktop 6 Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction Denial of Service -- Remote with User Interaction Provide Misleading Information -- Remote with User Interaction Access Confidential Data -- Remote with User Interaction Reduced Security -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2016-1695 CVE-2016-1694 CVE-2016-1693 CVE-2016-1692 CVE-2016-1691 CVE-2016-1690 CVE-2016-1689 CVE-2016-1688 CVE-2016-1687 CVE-2016-1686 CVE-2016-1685 CVE-2016-1684 CVE-2016-1683 CVE-2016-1682 CVE-2016-1681 CVE-2016-1680 CVE-2016-1679 CVE-2016-1678 CVE-2016-1677 CVE-2016-1676 CVE-2016-1675 CVE-2016-1674 CVE-2016-1673 CVE-2016-1672 Reference: ASB-2016.0059 Original Bulletin: https://access.redhat.com/errata/RHSA-2016:1190 - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: chromium-browser security update Advisory ID: RHSA-2016:1190-01 Product: Red Hat Enterprise Linux Supplementary Advisory URL: https://access.redhat.com/errata/RHSA-2016:1190 Issue date: 2016-06-01 CVE Names: CVE-2016-1672 CVE-2016-1673 CVE-2016-1674 CVE-2016-1675 CVE-2016-1676 CVE-2016-1677 CVE-2016-1678 CVE-2016-1679 CVE-2016-1680 CVE-2016-1681 CVE-2016-1682 CVE-2016-1683 CVE-2016-1684 CVE-2016-1685 CVE-2016-1686 CVE-2016-1687 CVE-2016-1688 CVE-2016-1689 CVE-2016-1690 CVE-2016-1691 CVE-2016-1692 CVE-2016-1693 CVE-2016-1694 CVE-2016-1695 ===================================================================== 1. Summary: An update for chromium-browser is now available for Red Hat Enterprise Linux 6 Supplementary. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64 3. Description: Chromium is an open-source web browser, powered by WebKit (Blink). This update upgrades Chromium to version 51.0.2704.63. Security Fix(es): * Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash, execute arbitrary code, or disclose sensitive information when visited by the victim. (CVE-2016-1672, CVE-2016-1673, CVE-2016-1674, CVE-2016-1675, CVE-2016-1676, CVE-2016-1678, CVE-2016-1679, CVE-2016-1680, CVE-2016-1681, CVE-2016-1695, CVE-2016-1677, CVE-2016-1682, CVE-2016-1683, CVE-2016-1684, CVE-2016-1685, CVE-2016-1686, CVE-2016-1687, CVE-2016-1688, CVE-2016-1689, CVE-2016-1690, CVE-2016-1691, CVE-2016-1692, CVE-2016-1693, CVE-2016-1694) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, Chromium must be restarted for the changes to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1340005 - CVE-2016-1672 chromium-browser: cross-origin bypass in extension bindings 1340006 - CVE-2016-1673 chromium-browser: cross-origin bypass in blink 1340007 - CVE-2016-1674 chromium-browser: cross-origin bypass in extensions 1340008 - CVE-2016-1675 chromium-browser: cross-origin bypass in blink 1340009 - CVE-2016-1676 chromium-browser: cross-origin bypass in extension bindings 1340010 - CVE-2016-1677 chromium-browser: type confusion in v8 1340011 - CVE-2016-1678 chromium-browser: heap overflow in v8 1340012 - CVE-2016-1679 chromium-browser: heap use-after-free in v8 bindings 1340013 - CVE-2016-1680 chromium-browser: heap use-after-free in skia 1340014 - CVE-2016-1681 chromium-browser: heap overflow in pdfium 1340015 - CVE-2016-1682 chromium-browser: csp bypass for serviceworker 1340016 - CVE-2016-1683 chromium-browser: out-of-bounds access in libxslt 1340017 - CVE-2016-1684 chromium-browser: integer overflow in libxslt 1340018 - CVE-2016-1685 chromium-browser: out-of-bounds read in pdfium 1340019 - CVE-2016-1686 chromium-browser: out-of-bounds read in pdfium 1340021 - CVE-2016-1687 chromium-browser: information leak in extensions 1340022 - CVE-2016-1688 chromium-browser: out-of-bounds read in v8 1340023 - CVE-2016-1689 chromium-browser: heap buffer overflow in media 1340024 - CVE-2016-1690 chromium-browser: heap use-after-free in autofill 1340026 - CVE-2016-1691 chromium-browser: heap buffer-overflow in skia 1340027 - CVE-2016-1692 chromium-browser: limited cross-origin bypass in serviceworker 1340028 - CVE-2016-1693 chromium-browser: http download of software removal tool 1340029 - CVE-2016-1694 chromium-browser: hpkp pins removed on cache clearance 1340030 - CVE-2016-1695 chromium-browser: various fixes from internal audits 6. Package List: Red Hat Enterprise Linux Desktop Supplementary (v. 6): i386: chromium-browser-51.0.2704.63-1.el6.i686.rpm chromium-browser-debuginfo-51.0.2704.63-1.el6.i686.rpm x86_64: chromium-browser-51.0.2704.63-1.el6.x86_64.rpm chromium-browser-debuginfo-51.0.2704.63-1.el6.x86_64.rpm Red Hat Enterprise Linux Server Supplementary (v. 6): i386: chromium-browser-51.0.2704.63-1.el6.i686.rpm chromium-browser-debuginfo-51.0.2704.63-1.el6.i686.rpm x86_64: chromium-browser-51.0.2704.63-1.el6.x86_64.rpm chromium-browser-debuginfo-51.0.2704.63-1.el6.x86_64.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 6): i386: chromium-browser-51.0.2704.63-1.el6.i686.rpm chromium-browser-debuginfo-51.0.2704.63-1.el6.i686.rpm x86_64: chromium-browser-51.0.2704.63-1.el6.x86_64.rpm chromium-browser-debuginfo-51.0.2704.63-1.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-1672 https://access.redhat.com/security/cve/CVE-2016-1673 https://access.redhat.com/security/cve/CVE-2016-1674 https://access.redhat.com/security/cve/CVE-2016-1675 https://access.redhat.com/security/cve/CVE-2016-1676 https://access.redhat.com/security/cve/CVE-2016-1677 https://access.redhat.com/security/cve/CVE-2016-1678 https://access.redhat.com/security/cve/CVE-2016-1679 https://access.redhat.com/security/cve/CVE-2016-1680 https://access.redhat.com/security/cve/CVE-2016-1681 https://access.redhat.com/security/cve/CVE-2016-1682 https://access.redhat.com/security/cve/CVE-2016-1683 https://access.redhat.com/security/cve/CVE-2016-1684 https://access.redhat.com/security/cve/CVE-2016-1685 https://access.redhat.com/security/cve/CVE-2016-1686 https://access.redhat.com/security/cve/CVE-2016-1687 https://access.redhat.com/security/cve/CVE-2016-1688 https://access.redhat.com/security/cve/CVE-2016-1689 https://access.redhat.com/security/cve/CVE-2016-1690 https://access.redhat.com/security/cve/CVE-2016-1691 https://access.redhat.com/security/cve/CVE-2016-1692 https://access.redhat.com/security/cve/CVE-2016-1693 https://access.redhat.com/security/cve/CVE-2016-1694 https://access.redhat.com/security/cve/CVE-2016-1695 https://access.redhat.com/security/updates/classification/#important https://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFXTr55XlSAg2UNWIIRArchAKCbVKWgaYWF1/QmJX3HddKpdg0gXwCguYBu 3EcXdh7fpKsNLrlPwP6DAkY= =UZOj - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBV0+XqYx+lLeg9Ub1AQiwzw/6Ax5DkVeDTY0mUwuJKEeMQs4tCG7RcKI4 TNISIc8pzHzpH2iLJU1uQsRSoO6jg4pavdHWQTzQ+rnFR6NzYN5AsQQMWqizFwoW msN+p8U0z1M1JcdRR5VV2h2vCIY4LCg9ktaWLZcoIgGYl/FUQKAa9WavG/pN0iUl 2KwTwKuROGJLQH7yBfEHVUlw5SN7SEdBtn+RA7rmv36CygJOjHHv/GHThyb2w/Ei zNYkF6bK6EbOEaQMcOwaiurUawF8Zlt+H/iShdsOIrWo3309pBF/3sJ1k17BEuYm PbeBkZBm52R8C0Cv1ueOnoOq1SsMk7nEGjIPeA6yavkd+9tcLBH/NfjLTdfxHMAS wllKXDfvnN/UBZZ7zIwv96s+dI7gbpKEzbdYiwVHiM/3VLIMUGB8JZ6/qYeciGGN 8mWa3WEvgm35ACEXSdeND+TUTWT3LwEsb4p+0SXC+VPdmlDOm4Cs2k6NqBK6vfFm lXESPW1gBzhzMeOe8bHhXqoEcD+P337nW/8f5g5nVsmAT+iR6z2SNIXzLNGiSs3c l9YeDmzK5h+vP/rcqOlLNvgI6M9wrLD12JbDkQMFh+rUc7OWvF4EHB7RDx/BU2+V lwNBxs5fknsNxcIqouEF/4XKQhuUDPKekdc+NTAcQx+2w9PT39KIYMMCPN8VC/V/ mV12uzITIUE= =VeH2 -----END PGP SIGNATURE-----