Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2020.2942 chromium-browser security update 27 August 2020 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: chromium-browser Publisher: Red Hat Operating System: Red Hat Enterprise Linux Server 6 Red Hat Enterprise Linux WS/Desktop 6 Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction Denial of Service -- Remote with User Interaction Access Confidential Data -- Remote with User Interaction Reduced Security -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2020-6556 CVE-2020-6555 CVE-2020-6554 CVE-2020-6553 CVE-2020-6552 CVE-2020-6551 CVE-2020-6550 CVE-2020-6549 CVE-2020-6548 CVE-2020-6547 CVE-2020-6546 CVE-2020-6545 CVE-2020-6544 CVE-2020-6543 CVE-2020-6542 Reference: ASB-2020.0146 ESB-2020.2839 ESB-2020.2764 Original Bulletin: https://access.redhat.com/errata/RHSA-2020:3560 - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: chromium-browser security update Advisory ID: RHSA-2020:3560-01 Product: Red Hat Enterprise Linux Supplementary Advisory URL: https://access.redhat.com/errata/RHSA-2020:3560 Issue date: 2020-08-26 CVE Names: CVE-2020-6542 CVE-2020-6543 CVE-2020-6544 CVE-2020-6545 CVE-2020-6546 CVE-2020-6547 CVE-2020-6548 CVE-2020-6549 CVE-2020-6550 CVE-2020-6551 CVE-2020-6552 CVE-2020-6553 CVE-2020-6554 CVE-2020-6555 CVE-2020-6556 ===================================================================== 1. Summary: An update for chromium-browser is now available for Red Hat Enterprise Linux 6 Supplementary. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, i686, x86_64 Red Hat Enterprise Linux HPC Node Supplementary (v. 6) - i686, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, i686, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, i686, x86_64 3. Description: Chromium is an open-source web browser, powered by WebKit (Blink). This update upgrades Chromium to version 84.0.4147.135. Security Fix(es): * chromium-browser: Use after free in ANGLE (CVE-2020-6542) * chromium-browser: Use after free in task scheduling (CVE-2020-6543) * chromium-browser: Use after free in media (CVE-2020-6544) * chromium-browser: Use after free in audio (CVE-2020-6545) * chromium-browser: Inappropriate implementation in installer (CVE-2020-6546) * chromium-browser: Incorrect security UI in media (CVE-2020-6547) * chromium-browser: Heap buffer overflow in Skia (CVE-2020-6548) * chromium-browser: Use after free in media (CVE-2020-6549) * chromium-browser: Use after free in IndexedDB (CVE-2020-6550) * chromium-browser: Use after free in WebXR (CVE-2020-6551) * chromium-browser: Use after free in Blink (CVE-2020-6552) * chromium-browser: Use after free in offline mode (CVE-2020-6553) * chromium-browser: Heap buffer overflow in SwiftShader (CVE-2020-6556) * chromium-browser: Use after free in extensions (CVE-2020-6554) * chromium-browser: Out of bounds read in WebGL (CVE-2020-6555) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, Chromium must be restarted for the changes to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1867939 - CVE-2020-6542 chromium-browser: Use after free in ANGLE 1867940 - CVE-2020-6543 chromium-browser: Use after free in task scheduling 1867941 - CVE-2020-6544 chromium-browser: Use after free in media 1867942 - CVE-2020-6545 chromium-browser: Use after free in audio 1867943 - CVE-2020-6546 chromium-browser: Inappropriate implementation in installer 1867944 - CVE-2020-6547 chromium-browser: Incorrect security UI in media 1867945 - CVE-2020-6548 chromium-browser: Heap buffer overflow in Skia 1867946 - CVE-2020-6549 chromium-browser: Use after free in media 1867947 - CVE-2020-6550 chromium-browser: Use after free in IndexedDB 1867948 - CVE-2020-6551 chromium-browser: Use after free in WebXR 1867949 - CVE-2020-6552 chromium-browser: Use after free in Blink 1867950 - CVE-2020-6553 chromium-browser: Use after free in offline mode 1867951 - CVE-2020-6554 chromium-browser: Use after free in extensions 1867952 - CVE-2020-6555 chromium-browser: Out of bounds read in WebGL 1870002 - CVE-2020-6556 chromium-browser: Heap buffer overflow in SwiftShader 6. Package List: Red Hat Enterprise Linux Desktop Supplementary (v. 6): i386: chromium-browser-84.0.4147.135-1.el6_10.i686.rpm chromium-browser-debuginfo-84.0.4147.135-1.el6_10.i686.rpm i686: chromium-browser-84.0.4147.135-1.el6_10.i686.rpm chromium-browser-debuginfo-84.0.4147.135-1.el6_10.i686.rpm x86_64: chromium-browser-84.0.4147.135-1.el6_10.x86_64.rpm chromium-browser-debuginfo-84.0.4147.135-1.el6_10.x86_64.rpm Red Hat Enterprise Linux HPC Node Supplementary (v. 6): i686: chromium-browser-84.0.4147.135-1.el6_10.i686.rpm chromium-browser-debuginfo-84.0.4147.135-1.el6_10.i686.rpm x86_64: chromium-browser-84.0.4147.135-1.el6_10.x86_64.rpm chromium-browser-debuginfo-84.0.4147.135-1.el6_10.x86_64.rpm Red Hat Enterprise Linux Server Supplementary (v. 6): i386: chromium-browser-84.0.4147.135-1.el6_10.i686.rpm chromium-browser-debuginfo-84.0.4147.135-1.el6_10.i686.rpm i686: chromium-browser-84.0.4147.135-1.el6_10.i686.rpm chromium-browser-debuginfo-84.0.4147.135-1.el6_10.i686.rpm x86_64: chromium-browser-84.0.4147.135-1.el6_10.x86_64.rpm chromium-browser-debuginfo-84.0.4147.135-1.el6_10.x86_64.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 6): i386: chromium-browser-84.0.4147.135-1.el6_10.i686.rpm chromium-browser-debuginfo-84.0.4147.135-1.el6_10.i686.rpm i686: chromium-browser-84.0.4147.135-1.el6_10.i686.rpm chromium-browser-debuginfo-84.0.4147.135-1.el6_10.i686.rpm x86_64: chromium-browser-84.0.4147.135-1.el6_10.x86_64.rpm chromium-browser-debuginfo-84.0.4147.135-1.el6_10.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2020-6542 https://access.redhat.com/security/cve/CVE-2020-6543 https://access.redhat.com/security/cve/CVE-2020-6544 https://access.redhat.com/security/cve/CVE-2020-6545 https://access.redhat.com/security/cve/CVE-2020-6546 https://access.redhat.com/security/cve/CVE-2020-6547 https://access.redhat.com/security/cve/CVE-2020-6548 https://access.redhat.com/security/cve/CVE-2020-6549 https://access.redhat.com/security/cve/CVE-2020-6550 https://access.redhat.com/security/cve/CVE-2020-6551 https://access.redhat.com/security/cve/CVE-2020-6552 https://access.redhat.com/security/cve/CVE-2020-6553 https://access.redhat.com/security/cve/CVE-2020-6554 https://access.redhat.com/security/cve/CVE-2020-6555 https://access.redhat.com/security/cve/CVE-2020-6556 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2020 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBX0ZudtzjgjWX9erEAQh4fQ//Y6bJFlDaBTb3UfJf1e4dOZrX8m40+uDk pPD/+wf+EBxPFW09ZKLJtj0cuWuo5GxX9R0Ti23kWa+xKr8RCIn81wQOUj2vO2OH lMrBEJ78J9fWTiNkT7OiaIcySVBGQSwLppLvYpZ70P/lKy9BuUxXgokTQ/g49Etq nLrBFbQmgKSVa7s9tlr0E47frFlclfj/1s5vWDehNsDTodUvg5I4Vp2wNESEDUQL PDZXpOQCyGtBe/Mm2ljqoYDrlILoMnmN32XWcw2fSUi9m/PIc3oCNm9u6VAPCfup PraEuLR0U8bPh/+85a3oL57JuOURsJDrjFwmXqx6ZYqlkV6l5msIbxIPVRZh8EdJ Ja5HLsPgfLOvTw+OfAw/+gnaFn9DNrTiMvRkMXDNEDtMEXiizIlJRDrLLKCVBLT2 pkk0rVQSohZedNqtR+6GvnfawOk3fgH8QNyp+910/Joz1910mOYumqjXZmwC4uTN PUzUq4h2wqLF+21qG876/tJxAX6mK/ZkQ8a0YKlbonZwixuWCVIHC+ETabDiePxF kYLW2M3S0qmC2j1Bgx4mC3BL4a5aSvT90+wYMlD4hcowX+91Cs2m2WJDLLRnP+ub qEkdibYDOKt62RTY6KVWeA8IHmr4YQxrgG865XRc4WhefwyO9LeZpAdIUfNcsp6l ne3wOtHRf3w= =JKyo - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBX0cF0eNLKJtyKPYoAQiQ9g/+Px2dv1E4D48dXaIqph1lia62YtcZUPIs mADlbwP9i+Q//ikA0cdeIOrhKALTjUIdoGk6NPiT0+AqSavgt/j4fdNYbe2Kss9g zrn4nm+quBpAG0jyuzd9VD5NN54bbEXdSl4HOvjDAwIaxk14T2PZHyQ4ap96Z+XL 133kwrDUu1X299jkcA0/+9slVNl0i8IdVHsO+k25y1x7TSGtV2t0ehFhXlWMKFvi XrFrtjkJBVP9Ep90xY8MaR7UqooF1WiloXYR2vxpTxFvR8T+kNboArbIOGfRgCxV eFaoa9tnNfrELCVWlHYcvHleLB3XtzB9LH2h1noymZS+/8T1IC5kkro9I2tngQH0 psbCXGIWJwYslOEVdJzsmH8WiMLtYD0C1J85GnfaNdzoOrspr/JS0j4POIkH0R7Z Mp2P45sTxc6zfUtlBDa76o+Fd+xsnKhOf/M/Y5yGbjvxGST3cM181AJXyUdVR+DS GircTq/ztaW04Y4QMVQUrrDg/cYGZSaliWuyGrxOulRq7i9viCr4J9GcoWVeG60Q CKpomSNawfkNCW5caUAt1LAsniLH+8aN4zgJYR2zwwKr8CPqAMkunM3HCrOJHEkd RNEo3GLgoJ8/B6ogt6FwEi21YNXj8ezm++P9ZnSl1CV26qKh3PklW5JzMACti0y9 F5qx1J7108Q= =h2si -----END PGP SIGNATURE-----