-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2016.1386
                Important: chromium-browser security update
                                2 June 2016

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           chromium-browser
Publisher:         Red Hat
Operating System:  Red Hat Enterprise Linux Server 6
                   Red Hat Enterprise Linux WS/Desktop 6
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Denial of Service               -- Remote with User Interaction
                   Provide Misleading Information  -- Remote with User Interaction
                   Access Confidential Data        -- Remote with User Interaction
                   Reduced Security                -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2016-1695 CVE-2016-1694 CVE-2016-1693
                   CVE-2016-1692 CVE-2016-1691 CVE-2016-1690
                   CVE-2016-1689 CVE-2016-1688 CVE-2016-1687
                   CVE-2016-1686 CVE-2016-1685 CVE-2016-1684
                   CVE-2016-1683 CVE-2016-1682 CVE-2016-1681
                   CVE-2016-1680 CVE-2016-1679 CVE-2016-1678
                   CVE-2016-1677 CVE-2016-1676 CVE-2016-1675
                   CVE-2016-1674 CVE-2016-1673 CVE-2016-1672

Reference:         ASB-2016.0059

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2016:1190

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: chromium-browser security update
Advisory ID:       RHSA-2016:1190-01
Product:           Red Hat Enterprise Linux Supplementary
Advisory URL:      https://access.redhat.com/errata/RHSA-2016:1190
Issue date:        2016-06-01
CVE Names:         CVE-2016-1672 CVE-2016-1673 CVE-2016-1674 
                   CVE-2016-1675 CVE-2016-1676 CVE-2016-1677 
                   CVE-2016-1678 CVE-2016-1679 CVE-2016-1680 
                   CVE-2016-1681 CVE-2016-1682 CVE-2016-1683 
                   CVE-2016-1684 CVE-2016-1685 CVE-2016-1686 
                   CVE-2016-1687 CVE-2016-1688 CVE-2016-1689 
                   CVE-2016-1690 CVE-2016-1691 CVE-2016-1692 
                   CVE-2016-1693 CVE-2016-1694 CVE-2016-1695 
=====================================================================

1. Summary:

An update for chromium-browser is now available for Red Hat Enterprise
Linux 6 Supplementary.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64

3. Description:

Chromium is an open-source web browser, powered by WebKit (Blink).

This update upgrades Chromium to version 51.0.2704.63.

Security Fix(es):

* Multiple flaws were found in the processing of malformed web content. A
web page containing malicious content could cause Chromium to crash,
execute arbitrary code, or disclose sensitive information when visited by
the victim. (CVE-2016-1672, CVE-2016-1673, CVE-2016-1674, CVE-2016-1675,
CVE-2016-1676, CVE-2016-1678, CVE-2016-1679, CVE-2016-1680, CVE-2016-1681,
CVE-2016-1695, CVE-2016-1677, CVE-2016-1682, CVE-2016-1683, CVE-2016-1684,
CVE-2016-1685, CVE-2016-1686, CVE-2016-1687, CVE-2016-1688, CVE-2016-1689,
CVE-2016-1690, CVE-2016-1691, CVE-2016-1692, CVE-2016-1693, CVE-2016-1694)

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

After installing the update, Chromium must be restarted for the changes to
take effect.

5. Bugs fixed (https://bugzilla.redhat.com/):

1340005 - CVE-2016-1672 chromium-browser: cross-origin bypass in extension bindings
1340006 - CVE-2016-1673 chromium-browser: cross-origin bypass in blink
1340007 - CVE-2016-1674 chromium-browser: cross-origin bypass in extensions
1340008 - CVE-2016-1675 chromium-browser: cross-origin bypass in blink
1340009 - CVE-2016-1676 chromium-browser: cross-origin bypass in extension bindings
1340010 - CVE-2016-1677 chromium-browser: type confusion in v8
1340011 - CVE-2016-1678 chromium-browser: heap overflow in v8
1340012 - CVE-2016-1679 chromium-browser: heap use-after-free in v8 bindings
1340013 - CVE-2016-1680 chromium-browser: heap use-after-free in skia
1340014 - CVE-2016-1681 chromium-browser: heap overflow in pdfium
1340015 - CVE-2016-1682 chromium-browser: csp bypass for serviceworker
1340016 - CVE-2016-1683 chromium-browser: out-of-bounds access in libxslt
1340017 - CVE-2016-1684 chromium-browser: integer overflow in libxslt
1340018 - CVE-2016-1685 chromium-browser: out-of-bounds read in pdfium
1340019 - CVE-2016-1686 chromium-browser: out-of-bounds read in pdfium
1340021 - CVE-2016-1687 chromium-browser: information leak in extensions
1340022 - CVE-2016-1688 chromium-browser: out-of-bounds read in v8
1340023 - CVE-2016-1689 chromium-browser: heap buffer overflow in media
1340024 - CVE-2016-1690 chromium-browser: heap use-after-free in autofill
1340026 - CVE-2016-1691 chromium-browser: heap buffer-overflow in skia
1340027 - CVE-2016-1692 chromium-browser: limited cross-origin bypass in serviceworker
1340028 - CVE-2016-1693 chromium-browser: http download of software removal tool
1340029 - CVE-2016-1694 chromium-browser: hpkp pins removed on cache clearance
1340030 - CVE-2016-1695 chromium-browser: various fixes from internal audits

6. Package List:

Red Hat Enterprise Linux Desktop Supplementary (v. 6):

i386:
chromium-browser-51.0.2704.63-1.el6.i686.rpm
chromium-browser-debuginfo-51.0.2704.63-1.el6.i686.rpm

x86_64:
chromium-browser-51.0.2704.63-1.el6.x86_64.rpm
chromium-browser-debuginfo-51.0.2704.63-1.el6.x86_64.rpm

Red Hat Enterprise Linux Server Supplementary (v. 6):

i386:
chromium-browser-51.0.2704.63-1.el6.i686.rpm
chromium-browser-debuginfo-51.0.2704.63-1.el6.i686.rpm

x86_64:
chromium-browser-51.0.2704.63-1.el6.x86_64.rpm
chromium-browser-debuginfo-51.0.2704.63-1.el6.x86_64.rpm

Red Hat Enterprise Linux Workstation Supplementary (v. 6):

i386:
chromium-browser-51.0.2704.63-1.el6.i686.rpm
chromium-browser-debuginfo-51.0.2704.63-1.el6.i686.rpm

x86_64:
chromium-browser-51.0.2704.63-1.el6.x86_64.rpm
chromium-browser-debuginfo-51.0.2704.63-1.el6.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2016-1672
https://access.redhat.com/security/cve/CVE-2016-1673
https://access.redhat.com/security/cve/CVE-2016-1674
https://access.redhat.com/security/cve/CVE-2016-1675
https://access.redhat.com/security/cve/CVE-2016-1676
https://access.redhat.com/security/cve/CVE-2016-1677
https://access.redhat.com/security/cve/CVE-2016-1678
https://access.redhat.com/security/cve/CVE-2016-1679
https://access.redhat.com/security/cve/CVE-2016-1680
https://access.redhat.com/security/cve/CVE-2016-1681
https://access.redhat.com/security/cve/CVE-2016-1682
https://access.redhat.com/security/cve/CVE-2016-1683
https://access.redhat.com/security/cve/CVE-2016-1684
https://access.redhat.com/security/cve/CVE-2016-1685
https://access.redhat.com/security/cve/CVE-2016-1686
https://access.redhat.com/security/cve/CVE-2016-1687
https://access.redhat.com/security/cve/CVE-2016-1688
https://access.redhat.com/security/cve/CVE-2016-1689
https://access.redhat.com/security/cve/CVE-2016-1690
https://access.redhat.com/security/cve/CVE-2016-1691
https://access.redhat.com/security/cve/CVE-2016-1692
https://access.redhat.com/security/cve/CVE-2016-1693
https://access.redhat.com/security/cve/CVE-2016-1694
https://access.redhat.com/security/cve/CVE-2016-1695
https://access.redhat.com/security/updates/classification/#important
https://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2016 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iD8DBQFXTr55XlSAg2UNWIIRArchAKCbVKWgaYWF1/QmJX3HddKpdg0gXwCguYBu
3EcXdh7fpKsNLrlPwP6DAkY=
=UZOj
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=VeH2
-----END PGP SIGNATURE-----