-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2017.0248
                Important: chromium-browser security update
                              27 January 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           chromium-browser
Publisher:         Red Hat
Operating System:  Red Hat Enterprise Linux Server 6
                   Red Hat Enterprise Linux WS/Desktop 6
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Cross-site Scripting            -- Remote with User Interaction
                   Denial of Service               -- Remote with User Interaction
                   Provide Misleading Information  -- Remote with User Interaction
                   Access Confidential Data        -- Remote with User Interaction
                   Unauthorised Access             -- Remote with User Interaction
                   Reduced Security                -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2017-5026 CVE-2017-5025 CVE-2017-5024
                   CVE-2017-5023 CVE-2017-5022 CVE-2017-5021
                   CVE-2017-5020 CVE-2017-5019 CVE-2017-5018
                   CVE-2017-5017 CVE-2017-5016 CVE-2017-5015
                   CVE-2017-5014 CVE-2017-5013 CVE-2017-5012
                   CVE-2017-5011 CVE-2017-5010 CVE-2017-5009
                   CVE-2017-5008 CVE-2017-5007 CVE-2017-5006

Reference:         ASB-2017.0008

Original Bulletin: 
   https://rhn.redhat.com/errata/RHSA-2017-0206.html

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: chromium-browser security update
Advisory ID:       RHSA-2017:0206-01
Product:           Red Hat Enterprise Linux Supplementary
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2017-0206.html
Issue date:        2017-01-26
CVE Names:         CVE-2017-5006 CVE-2017-5007 CVE-2017-5008 
                   CVE-2017-5009 CVE-2017-5010 CVE-2017-5011 
                   CVE-2017-5012 CVE-2017-5013 CVE-2017-5014 
                   CVE-2017-5015 CVE-2017-5016 CVE-2017-5017 
                   CVE-2017-5018 CVE-2017-5019 CVE-2017-5020 
                   CVE-2017-5021 CVE-2017-5022 CVE-2017-5023 
                   CVE-2017-5024 CVE-2017-5025 CVE-2017-5026 
=====================================================================

1. Summary:

An update for chromium-browser is now available for Red Hat Enterprise
Linux 6 Supplementary.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64

3. Description:

Chromium is an open-source web browser, powered by WebKit (Blink).

This update upgrades Chromium to version 56.0.2924.76.

Security Fix(es):

* Multiple flaws were found in the processing of malformed web content. A
web page containing malicious content could cause Chromium to crash,
execute arbitrary code, or disclose sensitive information when visited by
the victim. (CVE-2017-5006, CVE-2017-5007, CVE-2017-5008, CVE-2017-5009,
CVE-2017-5010, CVE-2017-5011, CVE-2017-5012, CVE-2017-5013, CVE-2017-5014,
CVE-2017-5015, CVE-2017-5016, CVE-2017-5017, CVE-2017-5018, CVE-2017-5019,
CVE-2017-5020, CVE-2017-5021, CVE-2017-5022, CVE-2017-5023, CVE-2017-5024,
CVE-2017-5025, CVE-2017-5026)

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

After installing the update, Chromium must be restarted for the changes to
take effect.

5. Bugs fixed (https://bugzilla.redhat.com/):

1416657 - CVE-2017-5007 chromium-browser: universal xss in blink
1416658 - CVE-2017-5006 chromium-browser: universal xss in blink
1416659 - CVE-2017-5008 chromium-browser: universal xss in blink
1416660 - CVE-2017-5010 chromium-browser: universal xss in blink
1416661 - CVE-2017-5011 chromium-browser: unauthorised file access in devtools
1416662 - CVE-2017-5009 chromium-browser: out of bounds memory access in webrtc
1416663 - CVE-2017-5012 chromium-browser: heap overflow in v8
1416664 - CVE-2017-5013 chromium-browser: address spoofing in omnibox
1416665 - CVE-2017-5014 chromium-browser: heap overflow in skia
1416666 - CVE-2017-5015 chromium-browser: address spoofing in omnibox
1416667 - CVE-2017-5019 chromium-browser: use after free in renderer
1416668 - CVE-2017-5016 chromium-browser: ui spoofing in blink
1416669 - CVE-2017-5017 chromium-browser: uninitialised memory access in webm video
1416670 - CVE-2017-5018 chromium-browser: universal xss in chrome://apps
1416671 - CVE-2017-5020 chromium-browser: universal xss in chrome://downloads
1416672 - CVE-2017-5021 chromium-browser: use after free in extensions
1416673 - CVE-2017-5022 chromium-browser: bypass of content security policy in blink
1416674 - CVE-2017-5023 chromium-browser: type confusion in metrics
1416675 - CVE-2017-5024 chromium-browser: heap overflow in ffmpeg
1416676 - CVE-2017-5025 chromium-browser: heap overflow in ffmpeg
1416677 - CVE-2017-5026 chromium-browser: ui spoofing

6. Package List:

Red Hat Enterprise Linux Desktop Supplementary (v. 6):

i386:
chromium-browser-56.0.2924.76-1.el6.i686.rpm
chromium-browser-debuginfo-56.0.2924.76-1.el6.i686.rpm

x86_64:
chromium-browser-56.0.2924.76-1.el6.x86_64.rpm
chromium-browser-debuginfo-56.0.2924.76-1.el6.x86_64.rpm

Red Hat Enterprise Linux Server Supplementary (v. 6):

i386:
chromium-browser-56.0.2924.76-1.el6.i686.rpm
chromium-browser-debuginfo-56.0.2924.76-1.el6.i686.rpm

x86_64:
chromium-browser-56.0.2924.76-1.el6.x86_64.rpm
chromium-browser-debuginfo-56.0.2924.76-1.el6.x86_64.rpm

Red Hat Enterprise Linux Workstation Supplementary (v. 6):

i386:
chromium-browser-56.0.2924.76-1.el6.i686.rpm
chromium-browser-debuginfo-56.0.2924.76-1.el6.i686.rpm

x86_64:
chromium-browser-56.0.2924.76-1.el6.x86_64.rpm
chromium-browser-debuginfo-56.0.2924.76-1.el6.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2017-5006
https://access.redhat.com/security/cve/CVE-2017-5007
https://access.redhat.com/security/cve/CVE-2017-5008
https://access.redhat.com/security/cve/CVE-2017-5009
https://access.redhat.com/security/cve/CVE-2017-5010
https://access.redhat.com/security/cve/CVE-2017-5011
https://access.redhat.com/security/cve/CVE-2017-5012
https://access.redhat.com/security/cve/CVE-2017-5013
https://access.redhat.com/security/cve/CVE-2017-5014
https://access.redhat.com/security/cve/CVE-2017-5015
https://access.redhat.com/security/cve/CVE-2017-5016
https://access.redhat.com/security/cve/CVE-2017-5017
https://access.redhat.com/security/cve/CVE-2017-5018
https://access.redhat.com/security/cve/CVE-2017-5019
https://access.redhat.com/security/cve/CVE-2017-5020
https://access.redhat.com/security/cve/CVE-2017-5021
https://access.redhat.com/security/cve/CVE-2017-5022
https://access.redhat.com/security/cve/CVE-2017-5023
https://access.redhat.com/security/cve/CVE-2017-5024
https://access.redhat.com/security/cve/CVE-2017-5025
https://access.redhat.com/security/cve/CVE-2017-5026
https://access.redhat.com/security/updates/classification/#important
https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2017 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iD8DBQFYinKOXlSAg2UNWIIRAnFVAJ9oP4Zb30KCP1XARUBiQU4CezOGbQCfaW6u
86uCGRaOeIAWJQ96hjxuWlo=
=zTq3
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=0Khk
-----END PGP SIGNATURE-----