Red Hat 9062 Published by

A chromium-browser security update has been released for Red Hat Enterprise Linux 6.



RHSA-2020:1487-01: Important: chromium-browser security update



=====================================================================
Red Hat Security Advisory

Synopsis: Important: chromium-browser security update
Advisory ID: RHSA-2020:1487-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL:   https://access.redhat.com/errata/RHSA-2020:1487
Issue date: 2020-04-16
CVE Names: CVE-2020-6423 CVE-2020-6430 CVE-2020-6431
CVE-2020-6432 CVE-2020-6433 CVE-2020-6434
CVE-2020-6435 CVE-2020-6436 CVE-2020-6437
CVE-2020-6438 CVE-2020-6439 CVE-2020-6440
CVE-2020-6441 CVE-2020-6442 CVE-2020-6443
CVE-2020-6444 CVE-2020-6445 CVE-2020-6446
CVE-2020-6447 CVE-2020-6448 CVE-2020-6454
CVE-2020-6455 CVE-2020-6456
=====================================================================

1. Summary:

An update for chromium-browser is now available for Red Hat Enterprise
Linux 6 Supplementary.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, i686, x86_64
Red Hat Enterprise Linux HPC Node Supplementary (v. 6) - i686, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, i686, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, i686, x86_64

3. Description:

Chromium is an open-source web browser, powered by WebKit (Blink).

This update upgrades Chromium to version 81.0.4044.92.

Security Fix(es):

* chromium-browser: Use after free in audio (CVE-2020-6423)

* chromium-browser: Use after free in extensions (CVE-2020-6454)

* chromium-browser: Out of bounds read in WebSQL (CVE-2020-6455)

* chromium-browser: Type Confusion in V8 (CVE-2020-6430)

* chromium-browser: Insufficient policy enforcement in full screen
(CVE-2020-6431)

* chromium-browser: Insufficient policy enforcement in navigations
(CVE-2020-6432)

* chromium-browser: Insufficient policy enforcement in extensions
(CVE-2020-6433)

* chromium-browser: Use after free in devtools (CVE-2020-6434)

* chromium-browser: Insufficient policy enforcement in extensions
(CVE-2020-6435)

* chromium-browser: Use after free in window management (CVE-2020-6436)

* chromium-browser: Insufficient validation of untrusted input in clipboard
(CVE-2020-6456)

* chromium-browser: Inappropriate implementation in WebView (CVE-2020-6437)

* chromium-browser: Insufficient policy enforcement in extensions
(CVE-2020-6438)

* chromium-browser: Insufficient policy enforcement in navigations
(CVE-2020-6439)

* chromium-browser: Inappropriate implementation in extensions
(CVE-2020-6440)

* chromium-browser: Insufficient policy enforcement in omnibox
(CVE-2020-6441)

* chromium-browser: Inappropriate implementation in cache (CVE-2020-6442)

* chromium-browser: Insufficient data validation in developer tools
(CVE-2020-6443)

* chromium-browser: Uninitialized use in WebRTC (CVE-2020-6444)

* chromium-browser: Insufficient policy enforcement in trusted types
(CVE-2020-6445)

* chromium-browser: Insufficient policy enforcement in trusted types
(CVE-2020-6446)

* chromium-browser: Inappropriate implementation in developer tools
(CVE-2020-6447)

* chromium-browser: Use after free in V8 (CVE-2020-6448)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

  https://access.redhat.com/articles/11258

After installing the update, Chromium must be restarted for the changes to
take effect.

5. Bugs fixed (  https://bugzilla.redhat.com/):

1822604 - CVE-2020-6454 chromium-browser: Use after free in extensions
1822605 - CVE-2020-6423 chromium-browser: Use after free in audio
1822606 - CVE-2020-6455 chromium-browser: Out of bounds read in WebSQL
1822607 - CVE-2020-6430 chromium-browser: Type Confusion in V8
1822608 - CVE-2020-6456 chromium-browser: Insufficient validation of untrusted input in clipboard
1822609 - CVE-2020-6431 chromium-browser: Insufficient policy enforcement in full screen
1822610 - CVE-2020-6433 chromium-browser: Insufficient policy enforcement in extensions
1822611 - CVE-2020-6434 chromium-browser: Use after free in devtools
1822612 - CVE-2020-6435 chromium-browser: Insufficient policy enforcement in extensions
1822613 - CVE-2020-6436 chromium-browser: Use after free in window management
1822614 - CVE-2020-6437 chromium-browser: Inappropriate implementation in WebView
1822615 - CVE-2020-6438 chromium-browser: Insufficient policy enforcement in extensions
1822616 - CVE-2020-6439 chromium-browser: Insufficient policy enforcement in navigations
1822617 - CVE-2020-6440 chromium-browser: Inappropriate implementation in extensions
1822618 - CVE-2020-6441 chromium-browser: Insufficient policy enforcement in omnibox
1822619 - CVE-2020-6442 chromium-browser: Inappropriate implementation in cache
1822620 - CVE-2020-6443 chromium-browser: Insufficient data validation in developer tools
1822621 - CVE-2020-6444 chromium-browser: Uninitialized use in WebRTC
1822622 - CVE-2020-6445 chromium-browser: Insufficient policy enforcement in trusted types
1822623 - CVE-2020-6446 chromium-browser: Insufficient policy enforcement in trusted types
1822624 - CVE-2020-6447 chromium-browser: Inappropriate implementation in developer tools
1822625 - CVE-2020-6448 chromium-browser: Use after free in V8
1822636 - CVE-2020-6432 chromium-browser: Insufficient policy enforcement in navigations

6. Package List:

Red Hat Enterprise Linux Desktop Supplementary (v. 6):

i386:
chromium-browser-81.0.4044.92-2.el6_10.i686.rpm
chromium-browser-debuginfo-81.0.4044.92-2.el6_10.i686.rpm

i686:
chromium-browser-81.0.4044.92-2.el6_10.i686.rpm
chromium-browser-debuginfo-81.0.4044.92-2.el6_10.i686.rpm

x86_64:
chromium-browser-81.0.4044.92-2.el6_10.x86_64.rpm
chromium-browser-debuginfo-81.0.4044.92-2.el6_10.x86_64.rpm

Red Hat Enterprise Linux HPC Node Supplementary (v. 6):

i686:
chromium-browser-81.0.4044.92-2.el6_10.i686.rpm
chromium-browser-debuginfo-81.0.4044.92-2.el6_10.i686.rpm

x86_64:
chromium-browser-81.0.4044.92-2.el6_10.x86_64.rpm
chromium-browser-debuginfo-81.0.4044.92-2.el6_10.x86_64.rpm

Red Hat Enterprise Linux Server Supplementary (v. 6):

i386:
chromium-browser-81.0.4044.92-2.el6_10.i686.rpm
chromium-browser-debuginfo-81.0.4044.92-2.el6_10.i686.rpm

i686:
chromium-browser-81.0.4044.92-2.el6_10.i686.rpm
chromium-browser-debuginfo-81.0.4044.92-2.el6_10.i686.rpm

x86_64:
chromium-browser-81.0.4044.92-2.el6_10.x86_64.rpm
chromium-browser-debuginfo-81.0.4044.92-2.el6_10.x86_64.rpm

Red Hat Enterprise Linux Workstation Supplementary (v. 6):

i386:
chromium-browser-81.0.4044.92-2.el6_10.i686.rpm
chromium-browser-debuginfo-81.0.4044.92-2.el6_10.i686.rpm

i686:
chromium-browser-81.0.4044.92-2.el6_10.i686.rpm
chromium-browser-debuginfo-81.0.4044.92-2.el6_10.i686.rpm

x86_64:
chromium-browser-81.0.4044.92-2.el6_10.x86_64.rpm
chromium-browser-debuginfo-81.0.4044.92-2.el6_10.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
  https://access.redhat.com/security/team/key/

7. References:

  https://access.redhat.com/security/cve/CVE-2020-6423
  https://access.redhat.com/security/cve/CVE-2020-6430
  https://access.redhat.com/security/cve/CVE-2020-6431
  https://access.redhat.com/security/cve/CVE-2020-6432
  https://access.redhat.com/security/cve/CVE-2020-6433
  https://access.redhat.com/security/cve/CVE-2020-6434
  https://access.redhat.com/security/cve/CVE-2020-6435
  https://access.redhat.com/security/cve/CVE-2020-6436
  https://access.redhat.com/security/cve/CVE-2020-6437
  https://access.redhat.com/security/cve/CVE-2020-6438
  https://access.redhat.com/security/cve/CVE-2020-6439
  https://access.redhat.com/security/cve/CVE-2020-6440
  https://access.redhat.com/security/cve/CVE-2020-6441
  https://access.redhat.com/security/cve/CVE-2020-6442
  https://access.redhat.com/security/cve/CVE-2020-6443
  https://access.redhat.com/security/cve/CVE-2020-6444
  https://access.redhat.com/security/cve/CVE-2020-6445
  https://access.redhat.com/security/cve/CVE-2020-6446
  https://access.redhat.com/security/cve/CVE-2020-6447
  https://access.redhat.com/security/cve/CVE-2020-6448
  https://access.redhat.com/security/cve/CVE-2020-6454
  https://access.redhat.com/security/cve/CVE-2020-6455
  https://access.redhat.com/security/cve/CVE-2020-6456
  https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is . More contact
details at   https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.