Executive Summary

Summary
Title chromium-browser security update
Informations
Name RHSA-2016:1190 First vendor Publication 2016-06-01
Vendor RedHat Last vendor Modification 2016-06-01
Severity (Vendor) N/A Revision 01

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P)
Cvss Base Score 6.8 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Problem Description:

An update for chromium-browser is now available for Red Hat Enterprise Linux 6 Supplementary.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64

3. Description:

Chromium is an open-source web browser, powered by WebKit (Blink).

This update upgrades Chromium to version 51.0.2704.63.

Security Fix(es):

* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash, execute arbitrary code, or disclose sensitive information when visited by the victim. (CVE-2016-1672, CVE-2016-1673, CVE-2016-1674, CVE-2016-1675, CVE-2016-1676, CVE-2016-1678, CVE-2016-1679, CVE-2016-1680, CVE-2016-1681, CVE-2016-1695, CVE-2016-1677, CVE-2016-1682, CVE-2016-1683, CVE-2016-1684, CVE-2016-1685, CVE-2016-1686, CVE-2016-1687, CVE-2016-1688, CVE-2016-1689, CVE-2016-1690, CVE-2016-1691, CVE-2016-1692, CVE-2016-1693, CVE-2016-1694)

4. Solution:

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

After installing the update, Chromium must be restarted for the changes to take effect.

5. Bugs fixed (https://bugzilla.redhat.com/):

1340005 - CVE-2016-1672 chromium-browser: cross-origin bypass in extension bindings 1340006 - CVE-2016-1673 chromium-browser: cross-origin bypass in blink 1340007 - CVE-2016-1674 chromium-browser: cross-origin bypass in extensions 1340008 - CVE-2016-1675 chromium-browser: cross-origin bypass in blink 1340009 - CVE-2016-1676 chromium-browser: cross-origin bypass in extension bindings 1340010 - CVE-2016-1677 chromium-browser: type confusion in v8 1340011 - CVE-2016-1678 chromium-browser: heap overflow in v8 1340012 - CVE-2016-1679 chromium-browser: heap use-after-free in v8 bindings 1340013 - CVE-2016-1680 chromium-browser: heap use-after-free in skia 1340014 - CVE-2016-1681 chromium-browser: heap overflow in pdfium 1340015 - CVE-2016-1682 chromium-browser: csp bypass for serviceworker 1340016 - CVE-2016-1683 chromium-browser: out-of-bounds access in libxslt 1340017 - CVE-2016-1684 chromium-browser: integer overflow in libxslt 1340018 - CVE-2016-1685 chromium-browser: out-of-bounds read in pdfium 1340019 - CVE-2016-1686 chromium-browser: out-of-bounds read in pdfium 1340021 - CVE-2016-1687 chromium-browser: information leak in extensions 1340022 - CVE-2016-1688 chromium-browser: out-of-bounds read in v8 1340023 - CVE-2016-1689 chromium-browser: heap buffer overflow in media 1340024 - CVE-2016-1690 chromium-browser: heap use-after-free in autofill 1340026 - CVE-2016-1691 chromium-browser: heap buffer-overflow in skia 1340027 - CVE-2016-1692 chromium-browser: limited cross-origin bypass in serviceworker 1340028 - CVE-2016-1693 chromium-browser: http download of software removal tool 1340029 - CVE-2016-1694 chromium-browser: hpkp pins removed on cache clearance 1340030 - CVE-2016-1695 chromium-browser: various fixes from internal audits

Original Source

Url : https://rhn.redhat.com/errata/RHSA-2016-1190.html

CWE : Common Weakness Enumeration

% Id Name
45 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
35 % CWE-284 Access Control (Authorization) Issues
10 % CWE-254 Security Features
10 % CWE-200 Information Exposure

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 3947
Application 333
Application 80
Os 3
Os 1
Os 3
Os 1
Os 1
Os 1
Os 1
Os 1
Os 1

Snort® IPS/IDS

Date Description
2016-06-09 Google Chrome PDFium jpeg2000 SIZ segment check failure heap buffer overflow ...
RuleID : 39162 - Revision : 4 - Type : FILE-PDF
2016-06-09 Google Chrome PDFium jpeg2000 SIZ segment check failure heap buffer overflow ...
RuleID : 39161 - Revision : 4 - Type : FILE-PDF

Nessus® Vulnerability Scanner

Date Description
2017-04-28 Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-3271-1.nasl - Type : ACT_GATHER_INFO
2016-07-21 Name : The remote host is missing a Mac OS X update that fixes multiple vulnerabilit...
File : macosx_SecUpd2016-004.nasl - Type : ACT_GATHER_INFO
2016-07-21 Name : The remote host is missing a Mac OS X security update that fixes multiple vul...
File : macosx_10_11_6.nasl - Type : ACT_GATHER_INFO
2016-07-21 Name : The remote device is affected by multiple vulnerabilities.
File : appletv_9_2_2.nasl - Type : ACT_GATHER_INFO
2016-07-19 Name : The remote host is running an application that is affected by multiple vulner...
File : itunes_12_4_2_banner.nasl - Type : ACT_GATHER_INFO
2016-07-19 Name : The remote host contains an application that is affected by multiple vulnerab...
File : itunes_12_4_2.nasl - Type : ACT_GATHER_INFO
2016-07-18 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201607-07.nasl - Type : ACT_GATHER_INFO
2016-06-21 Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_1a2aa04f371811e6b3c814dae9d210b8.nasl - Type : ACT_GATHER_INFO
2016-06-20 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-3605.nasl - Type : ACT_GATHER_INFO
2016-06-14 Name : The remote Debian host is missing a security update.
File : debian_DLA-514.nasl - Type : ACT_GATHER_INFO
2016-06-07 Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-2992-1.nasl - Type : ACT_GATHER_INFO
2016-06-07 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_c039a7612c2911e689123065ec8fd3ec.nasl - Type : ACT_GATHER_INFO
2016-06-06 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2016-682.nasl - Type : ACT_GATHER_INFO
2016-06-02 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2016-1190.nasl - Type : ACT_GATHER_INFO
2016-06-02 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-3590.nasl - Type : ACT_GATHER_INFO
2016-06-01 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2016-652.nasl - Type : ACT_GATHER_INFO
2016-05-31 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_1a6bbb9524b811e6bd313065ec8fd3ec.nasl - Type : ACT_GATHER_INFO
2016-05-27 Name : A web browser installed on the remote Windows host is affected by multiple vu...
File : google_chrome_51_0_2704_63.nasl - Type : ACT_GATHER_INFO
2016-05-27 Name : A web browser installed on the remote Mac OS X host is affected by multiple v...
File : macosx_google_chrome_51_0_2704_63.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
Date Informations
2016-06-06 17:36:05
  • Multiple Updates
2016-06-06 05:38:06
  • Multiple Updates
2016-06-03 13:27:14
  • Multiple Updates
2016-06-01 13:25:10
  • First insertion