-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: chromium-browser security update Advisory ID: RHSA-2020:2544-01 Product: Red Hat Enterprise Linux Supplementary Advisory URL: https://access.redhat.com/errata/RHSA-2020:2544 Issue date: 2020-06-15 CVE Names: CVE-2020-6465 CVE-2020-6466 CVE-2020-6467 CVE-2020-6468 CVE-2020-6469 CVE-2020-6470 CVE-2020-6471 CVE-2020-6472 CVE-2020-6473 CVE-2020-6474 CVE-2020-6475 CVE-2020-6476 CVE-2020-6478 CVE-2020-6479 CVE-2020-6480 CVE-2020-6481 CVE-2020-6482 CVE-2020-6483 CVE-2020-6484 CVE-2020-6485 CVE-2020-6486 CVE-2020-6487 CVE-2020-6488 CVE-2020-6489 CVE-2020-6490 CVE-2020-6491 CVE-2020-6493 CVE-2020-6494 CVE-2020-6495 CVE-2020-6496 ===================================================================== 1. Summary: An update for chromium-browser is now available for Red Hat Enterprise Linux 6 Supplementary. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, i686, x86_64 Red Hat Enterprise Linux HPC Node Supplementary (v. 6) - i686, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, i686, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, i686, x86_64 3. Description: Chromium is an open-source web browser, powered by WebKit (Blink). This update upgrades Chromium to version 83.0.4103.97. Security Fix(es): * chromium-browser: Use after free in reader mode (CVE-2020-6465) * chromium-browser: Use after free in media (CVE-2020-6466) * chromium-browser: Use after free in WebRTC (CVE-2020-6467) * chromium-browser: Type Confusion in V8 (CVE-2020-6468) * chromium-browser: Insufficient policy enforcement in developer tools (CVE-2020-6469) * chromium-browser: Use after free in WebAuthentication (CVE-2020-6493) * chromium-browser: Incorrect security UI in payments (CVE-2020-6494) * chromium-browser: Insufficient policy enforcement in developer tools (CVE-2020-6495) * chromium-browser: Use after free in payments (CVE-2020-6496) * chromium-browser: Insufficient validation of untrusted input in clipboard (CVE-2020-6470) * chromium-browser: Insufficient policy enforcement in developer tools (CVE-2020-6471) * chromium-browser: Insufficient policy enforcement in developer tools (CVE-2020-6472) * chromium-browser: Insufficient policy enforcement in Blink (CVE-2020-6473) * chromium-browser: Use after free in Blink (CVE-2020-6474) * chromium-browser: Incorrect security UI in full screen (CVE-2020-6475) * chromium-browser: Insufficient policy enforcement in tab strip (CVE-2020-6476) * chromium-browser: Inappropriate implementation in full screen (CVE-2020-6478) * chromium-browser: Inappropriate implementation in sharing (CVE-2020-6479) * chromium-browser: Insufficient policy enforcement in enterprise (CVE-2020-6480) * chromium-browser: Insufficient policy enforcement in URL formatting (CVE-2020-6481) * chromium-browser: Insufficient policy enforcement in developer tools (CVE-2020-6482) * chromium-browser: Insufficient policy enforcement in payments (CVE-2020-6483) * chromium-browser: Insufficient data validation in ChromeDriver (CVE-2020-6484) * chromium-browser: Insufficient data validation in media router (CVE-2020-6485) * chromium-browser: Insufficient policy enforcement in navigations (CVE-2020-6486) * chromium-browser: Insufficient policy enforcement in downloads (CVE-2020-6487) * chromium-browser: Insufficient policy enforcement in downloads (CVE-2020-6488) * chromium-browser: Inappropriate implementation in developer tools (CVE-2020-6489) * chromium-browser: Insufficient data validation in loader (CVE-2020-6490) * chromium-browser: Incorrect security UI in site information (CVE-2020-6491) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, Chromium must be restarted for the changes to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1837877 - CVE-2020-6465 chromium-browser: Use after free in reader mode 1837878 - CVE-2020-6466 chromium-browser: Use after free in media 1837879 - CVE-2020-6467 chromium-browser: Use after free in WebRTC 1837880 - CVE-2020-6468 chromium-browser: Type Confusion in V8 1837882 - CVE-2020-6470 chromium-browser: Insufficient validation of untrusted input in clipboard 1837883 - CVE-2020-6471 chromium-browser: Insufficient policy enforcement in developer tools 1837884 - CVE-2020-6472 chromium-browser: Insufficient policy enforcement in developer tools 1837885 - CVE-2020-6473 chromium-browser: Insufficient policy enforcement in Blink 1837886 - CVE-2020-6474 chromium-browser: Use after free in Blink 1837887 - CVE-2020-6475 chromium-browser: Incorrect security UI in full screen 1837889 - CVE-2020-6478 chromium-browser: Inappropriate implementation in full screen 1837890 - CVE-2020-6480 chromium-browser: Insufficient policy enforcement in enterprise 1837891 - CVE-2020-6481 chromium-browser: Insufficient policy enforcement in URL formatting 1837892 - CVE-2020-6482 chromium-browser: Insufficient policy enforcement in developer tools 1837893 - CVE-2020-6483 chromium-browser: Insufficient policy enforcement in payments 1837894 - CVE-2020-6484 chromium-browser: Insufficient data validation in ChromeDriver 1837896 - CVE-2020-6485 chromium-browser: Insufficient data validation in media router 1837897 - CVE-2020-6486 chromium-browser: Insufficient policy enforcement in navigations 1837898 - CVE-2020-6487 chromium-browser: Insufficient policy enforcement in downloads 1837899 - CVE-2020-6488 chromium-browser: Insufficient policy enforcement in downloads 1837900 - CVE-2020-6489 chromium-browser: Inappropriate implementation in developer tools 1837901 - CVE-2020-6490 chromium-browser: Insufficient data validation in loader 1837902 - CVE-2020-6491 chromium-browser: Incorrect security UI in site information 1837907 - CVE-2020-6469 chromium-browser: Insufficient policy enforcement in developer tools 1837912 - CVE-2020-6476 chromium-browser: Insufficient policy enforcement in tab strip 1837927 - CVE-2020-6479 chromium-browser: Inappropriate implementation in sharing 1844554 - CVE-2020-6493 chromium-browser: Use after free in WebAuthentication 1844555 - CVE-2020-6494 chromium-browser: Incorrect security UI in payments 1844556 - CVE-2020-6495 chromium-browser: Insufficient policy enforcement in developer tools 1844557 - CVE-2020-6496 chromium-browser: Use after free in payments 6. Package List: Red Hat Enterprise Linux Desktop Supplementary (v. 6): i386: chromium-browser-83.0.4103.97-1.el6_10.i686.rpm chromium-browser-debuginfo-83.0.4103.97-1.el6_10.i686.rpm i686: chromium-browser-83.0.4103.97-1.el6_10.i686.rpm chromium-browser-debuginfo-83.0.4103.97-1.el6_10.i686.rpm x86_64: chromium-browser-83.0.4103.97-1.el6_10.x86_64.rpm chromium-browser-debuginfo-83.0.4103.97-1.el6_10.x86_64.rpm Red Hat Enterprise Linux HPC Node Supplementary (v. 6): i686: chromium-browser-83.0.4103.97-1.el6_10.i686.rpm chromium-browser-debuginfo-83.0.4103.97-1.el6_10.i686.rpm x86_64: chromium-browser-83.0.4103.97-1.el6_10.x86_64.rpm chromium-browser-debuginfo-83.0.4103.97-1.el6_10.x86_64.rpm Red Hat Enterprise Linux Server Supplementary (v. 6): i386: chromium-browser-83.0.4103.97-1.el6_10.i686.rpm chromium-browser-debuginfo-83.0.4103.97-1.el6_10.i686.rpm i686: chromium-browser-83.0.4103.97-1.el6_10.i686.rpm chromium-browser-debuginfo-83.0.4103.97-1.el6_10.i686.rpm x86_64: chromium-browser-83.0.4103.97-1.el6_10.x86_64.rpm chromium-browser-debuginfo-83.0.4103.97-1.el6_10.x86_64.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 6): i386: chromium-browser-83.0.4103.97-1.el6_10.i686.rpm chromium-browser-debuginfo-83.0.4103.97-1.el6_10.i686.rpm i686: chromium-browser-83.0.4103.97-1.el6_10.i686.rpm chromium-browser-debuginfo-83.0.4103.97-1.el6_10.i686.rpm x86_64: chromium-browser-83.0.4103.97-1.el6_10.x86_64.rpm chromium-browser-debuginfo-83.0.4103.97-1.el6_10.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2020-6465 https://access.redhat.com/security/cve/CVE-2020-6466 https://access.redhat.com/security/cve/CVE-2020-6467 https://access.redhat.com/security/cve/CVE-2020-6468 https://access.redhat.com/security/cve/CVE-2020-6469 https://access.redhat.com/security/cve/CVE-2020-6470 https://access.redhat.com/security/cve/CVE-2020-6471 https://access.redhat.com/security/cve/CVE-2020-6472 https://access.redhat.com/security/cve/CVE-2020-6473 https://access.redhat.com/security/cve/CVE-2020-6474 https://access.redhat.com/security/cve/CVE-2020-6475 https://access.redhat.com/security/cve/CVE-2020-6476 https://access.redhat.com/security/cve/CVE-2020-6478 https://access.redhat.com/security/cve/CVE-2020-6479 https://access.redhat.com/security/cve/CVE-2020-6480 https://access.redhat.com/security/cve/CVE-2020-6481 https://access.redhat.com/security/cve/CVE-2020-6482 https://access.redhat.com/security/cve/CVE-2020-6483 https://access.redhat.com/security/cve/CVE-2020-6484 https://access.redhat.com/security/cve/CVE-2020-6485 https://access.redhat.com/security/cve/CVE-2020-6486 https://access.redhat.com/security/cve/CVE-2020-6487 https://access.redhat.com/security/cve/CVE-2020-6488 https://access.redhat.com/security/cve/CVE-2020-6489 https://access.redhat.com/security/cve/CVE-2020-6490 https://access.redhat.com/security/cve/CVE-2020-6491 https://access.redhat.com/security/cve/CVE-2020-6493 https://access.redhat.com/security/cve/CVE-2020-6494 https://access.redhat.com/security/cve/CVE-2020-6495 https://access.redhat.com/security/cve/CVE-2020-6496 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2020 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBXudvttzjgjWX9erEAQhS0A//VAEUo1J+vMah8qfsROL8jz5Db5dYA5Ek T3afaNa9OX0j/pfpYsmjqUky+lsKk3rn/J4+OuBZ5/6pasx4Eh1opFSXJ2UbFHNM siBhAbBlhgS93Geb+Q+7s2G44d03UIAx2r0jeJr3Z1LzTyM+7OUyM/vq1k7g2HAx KwuzW6nkL1kfU84sjiyyYu0eGggmqRZhYu5kOCAMLAHzJI5JvQPwBUU3AhwTlVwr qWy5GjNbTeAFQFoGnrJpopmCTl9kN1tRtdB9BV6ZkDxtVJzWrjRNRoLwTdv6OKuc bhYwDjC/Dl7CMBv3ouIg6sCJP1iuJ+6BZE5lLCaMxtXLpmhwhWHWfpBnEnt+Y6Mv T65uz1WGbwpOl+owHP+vwP5r3mpOl24uIROJ+6XNb5ghbVq624FvAbLrTfnzriII 9FZp/IRHnvr+D38CiKxHdBixmICnyZKU9snaHxJKouIChpHb6G1Oc+sjmrPqxcBt YdAvXacyqFmY8/zFOMS7/0vXTNNMZn30CdTU0yKHH4/nS9R+0dRXum1Q2+eIKdI0 N1aFZAfQ+3AqOOUY/a+gr3D8TQZ9QzbFpIQ4L3cZ3fxN0J+4DiVdvck0/MvnZEgF VLffKDE4Tf3RGbACiwyhw2is7hefCMgJ16bZANxcyIcxvWl1CqXW8JEFlkGdOotp n4/CXViDMxQ= =zRlY -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce