Red Hat 9036 Published by

A chromium-browser security update has been released for Red Hat Enterprise Linux 6.



RHSA-2020:2544-01: Important: chromium-browser security update



=====================================================================
Red Hat Security Advisory

Synopsis: Important: chromium-browser security update
Advisory ID: RHSA-2020:2544-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL:   https://access.redhat.com/errata/RHSA-2020:2544
Issue date: 2020-06-15
CVE Names: CVE-2020-6465 CVE-2020-6466 CVE-2020-6467
CVE-2020-6468 CVE-2020-6469 CVE-2020-6470
CVE-2020-6471 CVE-2020-6472 CVE-2020-6473
CVE-2020-6474 CVE-2020-6475 CVE-2020-6476
CVE-2020-6478 CVE-2020-6479 CVE-2020-6480
CVE-2020-6481 CVE-2020-6482 CVE-2020-6483
CVE-2020-6484 CVE-2020-6485 CVE-2020-6486
CVE-2020-6487 CVE-2020-6488 CVE-2020-6489
CVE-2020-6490 CVE-2020-6491 CVE-2020-6493
CVE-2020-6494 CVE-2020-6495 CVE-2020-6496
=====================================================================

1. Summary:

An update for chromium-browser is now available for Red Hat Enterprise
Linux 6 Supplementary.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, i686, x86_64
Red Hat Enterprise Linux HPC Node Supplementary (v. 6) - i686, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, i686, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, i686, x86_64

3. Description:

Chromium is an open-source web browser, powered by WebKit (Blink).

This update upgrades Chromium to version 83.0.4103.97.

Security Fix(es):

* chromium-browser: Use after free in reader mode (CVE-2020-6465)

* chromium-browser: Use after free in media (CVE-2020-6466)

* chromium-browser: Use after free in WebRTC (CVE-2020-6467)

* chromium-browser: Type Confusion in V8 (CVE-2020-6468)

* chromium-browser: Insufficient policy enforcement in developer tools
(CVE-2020-6469)

* chromium-browser: Use after free in WebAuthentication (CVE-2020-6493)

* chromium-browser: Incorrect security UI in payments (CVE-2020-6494)

* chromium-browser: Insufficient policy enforcement in developer tools
(CVE-2020-6495)

* chromium-browser: Use after free in payments (CVE-2020-6496)

* chromium-browser: Insufficient validation of untrusted input in clipboard
(CVE-2020-6470)

* chromium-browser: Insufficient policy enforcement in developer tools
(CVE-2020-6471)

* chromium-browser: Insufficient policy enforcement in developer tools
(CVE-2020-6472)

* chromium-browser: Insufficient policy enforcement in Blink
(CVE-2020-6473)

* chromium-browser: Use after free in Blink (CVE-2020-6474)

* chromium-browser: Incorrect security UI in full screen (CVE-2020-6475)

* chromium-browser: Insufficient policy enforcement in tab strip
(CVE-2020-6476)

* chromium-browser: Inappropriate implementation in full screen
(CVE-2020-6478)

* chromium-browser: Inappropriate implementation in sharing (CVE-2020-6479)

* chromium-browser: Insufficient policy enforcement in enterprise
(CVE-2020-6480)

* chromium-browser: Insufficient policy enforcement in URL formatting
(CVE-2020-6481)

* chromium-browser: Insufficient policy enforcement in developer tools
(CVE-2020-6482)

* chromium-browser: Insufficient policy enforcement in payments
(CVE-2020-6483)

* chromium-browser: Insufficient data validation in ChromeDriver
(CVE-2020-6484)

* chromium-browser: Insufficient data validation in media router
(CVE-2020-6485)

* chromium-browser: Insufficient policy enforcement in navigations
(CVE-2020-6486)

* chromium-browser: Insufficient policy enforcement in downloads
(CVE-2020-6487)

* chromium-browser: Insufficient policy enforcement in downloads
(CVE-2020-6488)

* chromium-browser: Inappropriate implementation in developer tools
(CVE-2020-6489)

* chromium-browser: Insufficient data validation in loader (CVE-2020-6490)

* chromium-browser: Incorrect security UI in site information
(CVE-2020-6491)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

  https://access.redhat.com/articles/11258

After installing the update, Chromium must be restarted for the changes to
take effect.

5. Bugs fixed (  https://bugzilla.redhat.com/):

1837877 - CVE-2020-6465 chromium-browser: Use after free in reader mode
1837878 - CVE-2020-6466 chromium-browser: Use after free in media
1837879 - CVE-2020-6467 chromium-browser: Use after free in WebRTC
1837880 - CVE-2020-6468 chromium-browser: Type Confusion in V8
1837882 - CVE-2020-6470 chromium-browser: Insufficient validation of untrusted input in clipboard
1837883 - CVE-2020-6471 chromium-browser: Insufficient policy enforcement in developer tools
1837884 - CVE-2020-6472 chromium-browser: Insufficient policy enforcement in developer tools
1837885 - CVE-2020-6473 chromium-browser: Insufficient policy enforcement in Blink
1837886 - CVE-2020-6474 chromium-browser: Use after free in Blink
1837887 - CVE-2020-6475 chromium-browser: Incorrect security UI in full screen
1837889 - CVE-2020-6478 chromium-browser: Inappropriate implementation in full screen
1837890 - CVE-2020-6480 chromium-browser: Insufficient policy enforcement in enterprise
1837891 - CVE-2020-6481 chromium-browser: Insufficient policy enforcement in URL formatting
1837892 - CVE-2020-6482 chromium-browser: Insufficient policy enforcement in developer tools
1837893 - CVE-2020-6483 chromium-browser: Insufficient policy enforcement in payments
1837894 - CVE-2020-6484 chromium-browser: Insufficient data validation in ChromeDriver
1837896 - CVE-2020-6485 chromium-browser: Insufficient data validation in media router
1837897 - CVE-2020-6486 chromium-browser: Insufficient policy enforcement in navigations
1837898 - CVE-2020-6487 chromium-browser: Insufficient policy enforcement in downloads
1837899 - CVE-2020-6488 chromium-browser: Insufficient policy enforcement in downloads
1837900 - CVE-2020-6489 chromium-browser: Inappropriate implementation in developer tools
1837901 - CVE-2020-6490 chromium-browser: Insufficient data validation in loader
1837902 - CVE-2020-6491 chromium-browser: Incorrect security UI in site information
1837907 - CVE-2020-6469 chromium-browser: Insufficient policy enforcement in developer tools
1837912 - CVE-2020-6476 chromium-browser: Insufficient policy enforcement in tab strip
1837927 - CVE-2020-6479 chromium-browser: Inappropriate implementation in sharing
1844554 - CVE-2020-6493 chromium-browser: Use after free in WebAuthentication
1844555 - CVE-2020-6494 chromium-browser: Incorrect security UI in payments
1844556 - CVE-2020-6495 chromium-browser: Insufficient policy enforcement in developer tools
1844557 - CVE-2020-6496 chromium-browser: Use after free in payments

6. Package List:

Red Hat Enterprise Linux Desktop Supplementary (v. 6):

i386:
chromium-browser-83.0.4103.97-1.el6_10.i686.rpm
chromium-browser-debuginfo-83.0.4103.97-1.el6_10.i686.rpm

i686:
chromium-browser-83.0.4103.97-1.el6_10.i686.rpm
chromium-browser-debuginfo-83.0.4103.97-1.el6_10.i686.rpm

x86_64:
chromium-browser-83.0.4103.97-1.el6_10.x86_64.rpm
chromium-browser-debuginfo-83.0.4103.97-1.el6_10.x86_64.rpm

Red Hat Enterprise Linux HPC Node Supplementary (v. 6):

i686:
chromium-browser-83.0.4103.97-1.el6_10.i686.rpm
chromium-browser-debuginfo-83.0.4103.97-1.el6_10.i686.rpm

x86_64:
chromium-browser-83.0.4103.97-1.el6_10.x86_64.rpm
chromium-browser-debuginfo-83.0.4103.97-1.el6_10.x86_64.rpm

Red Hat Enterprise Linux Server Supplementary (v. 6):

i386:
chromium-browser-83.0.4103.97-1.el6_10.i686.rpm
chromium-browser-debuginfo-83.0.4103.97-1.el6_10.i686.rpm

i686:
chromium-browser-83.0.4103.97-1.el6_10.i686.rpm
chromium-browser-debuginfo-83.0.4103.97-1.el6_10.i686.rpm

x86_64:
chromium-browser-83.0.4103.97-1.el6_10.x86_64.rpm
chromium-browser-debuginfo-83.0.4103.97-1.el6_10.x86_64.rpm

Red Hat Enterprise Linux Workstation Supplementary (v. 6):

i386:
chromium-browser-83.0.4103.97-1.el6_10.i686.rpm
chromium-browser-debuginfo-83.0.4103.97-1.el6_10.i686.rpm

i686:
chromium-browser-83.0.4103.97-1.el6_10.i686.rpm
chromium-browser-debuginfo-83.0.4103.97-1.el6_10.i686.rpm

x86_64:
chromium-browser-83.0.4103.97-1.el6_10.x86_64.rpm
chromium-browser-debuginfo-83.0.4103.97-1.el6_10.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
  https://access.redhat.com/security/team/key/

7. References:

  https://access.redhat.com/security/cve/CVE-2020-6465
  https://access.redhat.com/security/cve/CVE-2020-6466
  https://access.redhat.com/security/cve/CVE-2020-6467
  https://access.redhat.com/security/cve/CVE-2020-6468
  https://access.redhat.com/security/cve/CVE-2020-6469
  https://access.redhat.com/security/cve/CVE-2020-6470
  https://access.redhat.com/security/cve/CVE-2020-6471
  https://access.redhat.com/security/cve/CVE-2020-6472
  https://access.redhat.com/security/cve/CVE-2020-6473
  https://access.redhat.com/security/cve/CVE-2020-6474
  https://access.redhat.com/security/cve/CVE-2020-6475
  https://access.redhat.com/security/cve/CVE-2020-6476
  https://access.redhat.com/security/cve/CVE-2020-6478
  https://access.redhat.com/security/cve/CVE-2020-6479
  https://access.redhat.com/security/cve/CVE-2020-6480
  https://access.redhat.com/security/cve/CVE-2020-6481
  https://access.redhat.com/security/cve/CVE-2020-6482
  https://access.redhat.com/security/cve/CVE-2020-6483
  https://access.redhat.com/security/cve/CVE-2020-6484
  https://access.redhat.com/security/cve/CVE-2020-6485
  https://access.redhat.com/security/cve/CVE-2020-6486
  https://access.redhat.com/security/cve/CVE-2020-6487
  https://access.redhat.com/security/cve/CVE-2020-6488
  https://access.redhat.com/security/cve/CVE-2020-6489
  https://access.redhat.com/security/cve/CVE-2020-6490
  https://access.redhat.com/security/cve/CVE-2020-6491
  https://access.redhat.com/security/cve/CVE-2020-6493
  https://access.redhat.com/security/cve/CVE-2020-6494
  https://access.redhat.com/security/cve/CVE-2020-6495
  https://access.redhat.com/security/cve/CVE-2020-6496
  https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is . More contact
details at   https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.