A chromium-browser security update has been released for Red Hat Enterprise Linux 6.
RHSA-2020:1487-01: Important: chromium-browser security update
=====================================================================
Red Hat Security Advisory
Synopsis: Important: chromium-browser security update
Advisory ID: RHSA-2020:1487-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://access.redhat.com/errata/RHSA-2020:1487
Issue date: 2020-04-16
CVE Names: CVE-2020-6423 CVE-2020-6430 CVE-2020-6431
CVE-2020-6432 CVE-2020-6433 CVE-2020-6434
CVE-2020-6435 CVE-2020-6436 CVE-2020-6437
CVE-2020-6438 CVE-2020-6439 CVE-2020-6440
CVE-2020-6441 CVE-2020-6442 CVE-2020-6443
CVE-2020-6444 CVE-2020-6445 CVE-2020-6446
CVE-2020-6447 CVE-2020-6448 CVE-2020-6454
CVE-2020-6455 CVE-2020-6456
=====================================================================
1. Summary:
An update for chromium-browser is now available for Red Hat Enterprise
Linux 6 Supplementary.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, i686, x86_64
Red Hat Enterprise Linux HPC Node Supplementary (v. 6) - i686, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, i686, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, i686, x86_64
3. Description:
Chromium is an open-source web browser, powered by WebKit (Blink).
This update upgrades Chromium to version 81.0.4044.92.
Security Fix(es):
* chromium-browser: Use after free in audio (CVE-2020-6423)
* chromium-browser: Use after free in extensions (CVE-2020-6454)
* chromium-browser: Out of bounds read in WebSQL (CVE-2020-6455)
* chromium-browser: Type Confusion in V8 (CVE-2020-6430)
* chromium-browser: Insufficient policy enforcement in full screen
(CVE-2020-6431)
* chromium-browser: Insufficient policy enforcement in navigations
(CVE-2020-6432)
* chromium-browser: Insufficient policy enforcement in extensions
(CVE-2020-6433)
* chromium-browser: Use after free in devtools (CVE-2020-6434)
* chromium-browser: Insufficient policy enforcement in extensions
(CVE-2020-6435)
* chromium-browser: Use after free in window management (CVE-2020-6436)
* chromium-browser: Insufficient validation of untrusted input in clipboard
(CVE-2020-6456)
* chromium-browser: Inappropriate implementation in WebView (CVE-2020-6437)
* chromium-browser: Insufficient policy enforcement in extensions
(CVE-2020-6438)
* chromium-browser: Insufficient policy enforcement in navigations
(CVE-2020-6439)
* chromium-browser: Inappropriate implementation in extensions
(CVE-2020-6440)
* chromium-browser: Insufficient policy enforcement in omnibox
(CVE-2020-6441)
* chromium-browser: Inappropriate implementation in cache (CVE-2020-6442)
* chromium-browser: Insufficient data validation in developer tools
(CVE-2020-6443)
* chromium-browser: Uninitialized use in WebRTC (CVE-2020-6444)
* chromium-browser: Insufficient policy enforcement in trusted types
(CVE-2020-6445)
* chromium-browser: Insufficient policy enforcement in trusted types
(CVE-2020-6446)
* chromium-browser: Inappropriate implementation in developer tools
(CVE-2020-6447)
* chromium-browser: Use after free in V8 (CVE-2020-6448)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing the update, Chromium must be restarted for the changes to
take effect.
5. Bugs fixed ( https://bugzilla.redhat.com/):
1822604 - CVE-2020-6454 chromium-browser: Use after free in extensions
1822605 - CVE-2020-6423 chromium-browser: Use after free in audio
1822606 - CVE-2020-6455 chromium-browser: Out of bounds read in WebSQL
1822607 - CVE-2020-6430 chromium-browser: Type Confusion in V8
1822608 - CVE-2020-6456 chromium-browser: Insufficient validation of untrusted input in clipboard
1822609 - CVE-2020-6431 chromium-browser: Insufficient policy enforcement in full screen
1822610 - CVE-2020-6433 chromium-browser: Insufficient policy enforcement in extensions
1822611 - CVE-2020-6434 chromium-browser: Use after free in devtools
1822612 - CVE-2020-6435 chromium-browser: Insufficient policy enforcement in extensions
1822613 - CVE-2020-6436 chromium-browser: Use after free in window management
1822614 - CVE-2020-6437 chromium-browser: Inappropriate implementation in WebView
1822615 - CVE-2020-6438 chromium-browser: Insufficient policy enforcement in extensions
1822616 - CVE-2020-6439 chromium-browser: Insufficient policy enforcement in navigations
1822617 - CVE-2020-6440 chromium-browser: Inappropriate implementation in extensions
1822618 - CVE-2020-6441 chromium-browser: Insufficient policy enforcement in omnibox
1822619 - CVE-2020-6442 chromium-browser: Inappropriate implementation in cache
1822620 - CVE-2020-6443 chromium-browser: Insufficient data validation in developer tools
1822621 - CVE-2020-6444 chromium-browser: Uninitialized use in WebRTC
1822622 - CVE-2020-6445 chromium-browser: Insufficient policy enforcement in trusted types
1822623 - CVE-2020-6446 chromium-browser: Insufficient policy enforcement in trusted types
1822624 - CVE-2020-6447 chromium-browser: Inappropriate implementation in developer tools
1822625 - CVE-2020-6448 chromium-browser: Use after free in V8
1822636 - CVE-2020-6432 chromium-browser: Insufficient policy enforcement in navigations
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
chromium-browser-81.0.4044.92-2.el6_10.i686.rpm
chromium-browser-debuginfo-81.0.4044.92-2.el6_10.i686.rpm
i686:
chromium-browser-81.0.4044.92-2.el6_10.i686.rpm
chromium-browser-debuginfo-81.0.4044.92-2.el6_10.i686.rpm
x86_64:
chromium-browser-81.0.4044.92-2.el6_10.x86_64.rpm
chromium-browser-debuginfo-81.0.4044.92-2.el6_10.x86_64.rpm
Red Hat Enterprise Linux HPC Node Supplementary (v. 6):
i686:
chromium-browser-81.0.4044.92-2.el6_10.i686.rpm
chromium-browser-debuginfo-81.0.4044.92-2.el6_10.i686.rpm
x86_64:
chromium-browser-81.0.4044.92-2.el6_10.x86_64.rpm
chromium-browser-debuginfo-81.0.4044.92-2.el6_10.x86_64.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
chromium-browser-81.0.4044.92-2.el6_10.i686.rpm
chromium-browser-debuginfo-81.0.4044.92-2.el6_10.i686.rpm
i686:
chromium-browser-81.0.4044.92-2.el6_10.i686.rpm
chromium-browser-debuginfo-81.0.4044.92-2.el6_10.i686.rpm
x86_64:
chromium-browser-81.0.4044.92-2.el6_10.x86_64.rpm
chromium-browser-debuginfo-81.0.4044.92-2.el6_10.x86_64.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
chromium-browser-81.0.4044.92-2.el6_10.i686.rpm
chromium-browser-debuginfo-81.0.4044.92-2.el6_10.i686.rpm
i686:
chromium-browser-81.0.4044.92-2.el6_10.i686.rpm
chromium-browser-debuginfo-81.0.4044.92-2.el6_10.i686.rpm
x86_64:
chromium-browser-81.0.4044.92-2.el6_10.x86_64.rpm
chromium-browser-debuginfo-81.0.4044.92-2.el6_10.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2020-6423
https://access.redhat.com/security/cve/CVE-2020-6430
https://access.redhat.com/security/cve/CVE-2020-6431
https://access.redhat.com/security/cve/CVE-2020-6432
https://access.redhat.com/security/cve/CVE-2020-6433
https://access.redhat.com/security/cve/CVE-2020-6434
https://access.redhat.com/security/cve/CVE-2020-6435
https://access.redhat.com/security/cve/CVE-2020-6436
https://access.redhat.com/security/cve/CVE-2020-6437
https://access.redhat.com/security/cve/CVE-2020-6438
https://access.redhat.com/security/cve/CVE-2020-6439
https://access.redhat.com/security/cve/CVE-2020-6440
https://access.redhat.com/security/cve/CVE-2020-6441
https://access.redhat.com/security/cve/CVE-2020-6442
https://access.redhat.com/security/cve/CVE-2020-6443
https://access.redhat.com/security/cve/CVE-2020-6444
https://access.redhat.com/security/cve/CVE-2020-6445
https://access.redhat.com/security/cve/CVE-2020-6446
https://access.redhat.com/security/cve/CVE-2020-6447
https://access.redhat.com/security/cve/CVE-2020-6448
https://access.redhat.com/security/cve/CVE-2020-6454
https://access.redhat.com/security/cve/CVE-2020-6455
https://access.redhat.com/security/cve/CVE-2020-6456
https://access.redhat.com/security/updates/classification/#important
8. Contact:
The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2020 Red Hat, Inc.