-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Important: chromium-browser security update
Advisory ID:       RHSA-2020:3723-01
Product:           Red Hat Enterprise Linux Supplementary
Advisory URL:      https://access.redhat.com/errata/RHSA-2020:3723
Issue date:        2020-09-10
CVE Names:         CVE-2020-6559 CVE-2020-6560 CVE-2020-6561 
                   CVE-2020-6562 CVE-2020-6563 CVE-2020-6564 
                   CVE-2020-6565 CVE-2020-6566 CVE-2020-6567 
                   CVE-2020-6568 CVE-2020-6569 CVE-2020-6570 
                   CVE-2020-6571 
====================================================================
1. Summary:

An update for chromium-browser is now available for Red Hat Enterprise
Linux 6 Supplementary.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, i686, x86_64
Red Hat Enterprise Linux HPC Node Supplementary (v. 6) - i686, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, i686, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, i686, x86_64

3. Description:

Chromium is an open-source web browser, powered by WebKit (Blink).

This update upgrades Chromium to version 85.0.4183.83.

Security Fix(es):

* chromium-browser: Use after free in presentation API (CVE-2020-6559)

* chromium-browser: Incorrect security UI in Omnibox (CVE-2020-6571)

* chromium-browser: Insufficient policy enforcement in autofill
(CVE-2020-6560)

* chromium-browser: Inappropriate implementation in Content Security Policy
(CVE-2020-6561)

* chromium-browser: Insufficient policy enforcement in Blink
(CVE-2020-6562)

* chromium-browser: Insufficient policy enforcement in intent handling
(CVE-2020-6563)

* chromium-browser: Incorrect security UI in permissions (CVE-2020-6564)

* chromium-browser: Incorrect security UI in Omnibox (CVE-2020-6565)

* chromium-browser: Insufficient policy enforcement in media
(CVE-2020-6566)

* chromium-browser: Insufficient validation of untrusted input in command
line handling (CVE-2020-6567)

* chromium-browser: Insufficient policy enforcement in intent handling
(CVE-2020-6568)

* chromium-browser: Integer overflow in WebUSB (CVE-2020-6569)

* chromium-browser: Side-channel information leakage in WebRTC
(CVE-2020-6570)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

After installing the update, Chromium must be restarted for the changes to
take effect.

5. Bugs fixed (https://bugzilla.redhat.com/):

1872945 - CVE-2020-6559 chromium-browser: Use after free in presentation API
1872946 - CVE-2020-6560 chromium-browser: Insufficient policy enforcement in autofill
1872947 - CVE-2020-6561 chromium-browser: Inappropriate implementation in Content Security Policy
1872948 - CVE-2020-6562 chromium-browser: Insufficient policy enforcement in Blink
1872949 - CVE-2020-6563 chromium-browser: Insufficient policy enforcement in intent handling
1872950 - CVE-2020-6564 chromium-browser: Incorrect security UI in permissions
1872951 - CVE-2020-6565 chromium-browser: Incorrect security UI in Omnibox
1872952 - CVE-2020-6566 chromium-browser: Insufficient policy enforcement in media
1872953 - CVE-2020-6567 chromium-browser: Insufficient validation of untrusted input in command line handling
1872955 - CVE-2020-6568 chromium-browser: Insufficient policy enforcement in intent handling
1872956 - CVE-2020-6569 chromium-browser: Integer overflow in WebUSB
1872957 - CVE-2020-6570 chromium-browser: Side-channel information leakage in WebRTC
1872958 - CVE-2020-6571 chromium-browser: Incorrect security UI in Omnibox

6. Package List:

Red Hat Enterprise Linux Desktop Supplementary (v. 6):

i386:
chromium-browser-85.0.4183.83-1.el6_10.i686.rpm
chromium-browser-debuginfo-85.0.4183.83-1.el6_10.i686.rpm

i686:
chromium-browser-85.0.4183.83-1.el6_10.i686.rpm
chromium-browser-debuginfo-85.0.4183.83-1.el6_10.i686.rpm

x86_64:
chromium-browser-85.0.4183.83-1.el6_10.x86_64.rpm
chromium-browser-debuginfo-85.0.4183.83-1.el6_10.x86_64.rpm

Red Hat Enterprise Linux HPC Node Supplementary (v. 6):

i686:
chromium-browser-85.0.4183.83-1.el6_10.i686.rpm
chromium-browser-debuginfo-85.0.4183.83-1.el6_10.i686.rpm

x86_64:
chromium-browser-85.0.4183.83-1.el6_10.x86_64.rpm
chromium-browser-debuginfo-85.0.4183.83-1.el6_10.x86_64.rpm

Red Hat Enterprise Linux Server Supplementary (v. 6):

i386:
chromium-browser-85.0.4183.83-1.el6_10.i686.rpm
chromium-browser-debuginfo-85.0.4183.83-1.el6_10.i686.rpm

i686:
chromium-browser-85.0.4183.83-1.el6_10.i686.rpm
chromium-browser-debuginfo-85.0.4183.83-1.el6_10.i686.rpm

x86_64:
chromium-browser-85.0.4183.83-1.el6_10.x86_64.rpm
chromium-browser-debuginfo-85.0.4183.83-1.el6_10.x86_64.rpm

Red Hat Enterprise Linux Workstation Supplementary (v. 6):

i386:
chromium-browser-85.0.4183.83-1.el6_10.i686.rpm
chromium-browser-debuginfo-85.0.4183.83-1.el6_10.i686.rpm

i686:
chromium-browser-85.0.4183.83-1.el6_10.i686.rpm
chromium-browser-debuginfo-85.0.4183.83-1.el6_10.i686.rpm

x86_64:
chromium-browser-85.0.4183.83-1.el6_10.x86_64.rpm
chromium-browser-debuginfo-85.0.4183.83-1.el6_10.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2020-6559
https://access.redhat.com/security/cve/CVE-2020-6560
https://access.redhat.com/security/cve/CVE-2020-6561
https://access.redhat.com/security/cve/CVE-2020-6562
https://access.redhat.com/security/cve/CVE-2020-6563
https://access.redhat.com/security/cve/CVE-2020-6564
https://access.redhat.com/security/cve/CVE-2020-6565
https://access.redhat.com/security/cve/CVE-2020-6566
https://access.redhat.com/security/cve/CVE-2020-6567
https://access.redhat.com/security/cve/CVE-2020-6568
https://access.redhat.com/security/cve/CVE-2020-6569
https://access.redhat.com/security/cve/CVE-2020-6570
https://access.redhat.com/security/cve/CVE-2020-6571
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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VMMg
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2020-3723:01 Important: chromium-browser security update

An update for chromium-browser is now available for Red Hat Enterprise Linux 6 Supplementary

Summary

Chromium is an open-source web browser, powered by WebKit (Blink).
This update upgrades Chromium to version 85.0.4183.83.
Security Fix(es):
* chromium-browser: Use after free in presentation API (CVE-2020-6559)
* chromium-browser: Incorrect security UI in Omnibox (CVE-2020-6571)
* chromium-browser: Insufficient policy enforcement in autofill (CVE-2020-6560)
* chromium-browser: Inappropriate implementation in Content Security Policy (CVE-2020-6561)
* chromium-browser: Insufficient policy enforcement in Blink (CVE-2020-6562)
* chromium-browser: Insufficient policy enforcement in intent handling (CVE-2020-6563)
* chromium-browser: Incorrect security UI in permissions (CVE-2020-6564)
* chromium-browser: Incorrect security UI in Omnibox (CVE-2020-6565)
* chromium-browser: Insufficient policy enforcement in media (CVE-2020-6566)
* chromium-browser: Insufficient validation of untrusted input in command line handling (CVE-2020-6567)
* chromium-browser: Insufficient policy enforcement in intent handling (CVE-2020-6568)
* chromium-browser: Integer overflow in WebUSB (CVE-2020-6569)
* chromium-browser: Side-channel information leakage in WebRTC (CVE-2020-6570)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.



Summary


Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing the update, Chromium must be restarted for the changes to take effect.

References

https://access.redhat.com/security/cve/CVE-2020-6559 https://access.redhat.com/security/cve/CVE-2020-6560 https://access.redhat.com/security/cve/CVE-2020-6561 https://access.redhat.com/security/cve/CVE-2020-6562 https://access.redhat.com/security/cve/CVE-2020-6563 https://access.redhat.com/security/cve/CVE-2020-6564 https://access.redhat.com/security/cve/CVE-2020-6565 https://access.redhat.com/security/cve/CVE-2020-6566 https://access.redhat.com/security/cve/CVE-2020-6567 https://access.redhat.com/security/cve/CVE-2020-6568 https://access.redhat.com/security/cve/CVE-2020-6569 https://access.redhat.com/security/cve/CVE-2020-6570 https://access.redhat.com/security/cve/CVE-2020-6571 https://access.redhat.com/security/updates/classification/#important

Package List

Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386: chromium-browser-85.0.4183.83-1.el6_10.i686.rpm chromium-browser-debuginfo-85.0.4183.83-1.el6_10.i686.rpm
i686: chromium-browser-85.0.4183.83-1.el6_10.i686.rpm chromium-browser-debuginfo-85.0.4183.83-1.el6_10.i686.rpm
x86_64: chromium-browser-85.0.4183.83-1.el6_10.x86_64.rpm chromium-browser-debuginfo-85.0.4183.83-1.el6_10.x86_64.rpm
Red Hat Enterprise Linux HPC Node Supplementary (v. 6):
i686: chromium-browser-85.0.4183.83-1.el6_10.i686.rpm chromium-browser-debuginfo-85.0.4183.83-1.el6_10.i686.rpm
x86_64: chromium-browser-85.0.4183.83-1.el6_10.x86_64.rpm chromium-browser-debuginfo-85.0.4183.83-1.el6_10.x86_64.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386: chromium-browser-85.0.4183.83-1.el6_10.i686.rpm chromium-browser-debuginfo-85.0.4183.83-1.el6_10.i686.rpm
i686: chromium-browser-85.0.4183.83-1.el6_10.i686.rpm chromium-browser-debuginfo-85.0.4183.83-1.el6_10.i686.rpm
x86_64: chromium-browser-85.0.4183.83-1.el6_10.x86_64.rpm chromium-browser-debuginfo-85.0.4183.83-1.el6_10.x86_64.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386: chromium-browser-85.0.4183.83-1.el6_10.i686.rpm chromium-browser-debuginfo-85.0.4183.83-1.el6_10.i686.rpm
i686: chromium-browser-85.0.4183.83-1.el6_10.i686.rpm chromium-browser-debuginfo-85.0.4183.83-1.el6_10.i686.rpm
x86_64: chromium-browser-85.0.4183.83-1.el6_10.x86_64.rpm chromium-browser-debuginfo-85.0.4183.83-1.el6_10.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/


Severity
Advisory ID: RHSA-2020:3723-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://access.redhat.com/errata/RHSA-2020:3723
Issued Date: : 2020-09-10
CVE Names: CVE-2020-6559 CVE-2020-6560 CVE-2020-6561 CVE-2020-6562 CVE-2020-6563 CVE-2020-6564 CVE-2020-6565 CVE-2020-6566 CVE-2020-6567 CVE-2020-6568 CVE-2020-6569 CVE-2020-6570 CVE-2020-6571

Topic

An update for chromium-browser is now available for Red Hat EnterpriseLinux 6 Supplementary.Red Hat Product Security has rated this update as having a security impactof Important. A Common Vulnerability Scoring System (CVSS) base score,which gives a detailed severity rating, is available for each vulnerabilityfrom the CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures

Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, i686, x86_64

Red Hat Enterprise Linux HPC Node Supplementary (v. 6) - i686, x86_64

Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, i686, x86_64

Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, i686, x86_64


Bugs Fixed

1872945 - CVE-2020-6559 chromium-browser: Use after free in presentation API

1872946 - CVE-2020-6560 chromium-browser: Insufficient policy enforcement in autofill

1872947 - CVE-2020-6561 chromium-browser: Inappropriate implementation in Content Security Policy

1872948 - CVE-2020-6562 chromium-browser: Insufficient policy enforcement in Blink

1872949 - CVE-2020-6563 chromium-browser: Insufficient policy enforcement in intent handling

1872950 - CVE-2020-6564 chromium-browser: Incorrect security UI in permissions

1872951 - CVE-2020-6565 chromium-browser: Incorrect security UI in Omnibox

1872952 - CVE-2020-6566 chromium-browser: Insufficient policy enforcement in media

1872953 - CVE-2020-6567 chromium-browser: Insufficient validation of untrusted input in command line handling

1872955 - CVE-2020-6568 chromium-browser: Insufficient policy enforcement in intent handling

1872956 - CVE-2020-6569 chromium-browser: Integer overflow in WebUSB

1872957 - CVE-2020-6570 chromium-browser: Side-channel information leakage in WebRTC

1872958 - CVE-2020-6571 chromium-browser: Incorrect security UI in Omnibox