{"id":"RHSA-2016:0359","summary":"Red Hat Security Advisory: chromium-browser security update","modified":"2026-01-14T11:02:21.002769Z","published":"2024-09-13T11:31:10Z","upstream":["CVE-2016-1630","CVE-2016-1631","CVE-2016-1632","CVE-2016-1633","CVE-2016-1634","CVE-2016-1635","CVE-2016-1636","CVE-2016-1637","CVE-2016-1638","CVE-2016-1639","CVE-2016-1640","CVE-2016-1641","CVE-2016-1642","CVE-2016-2843","CVE-2016-2844","CVE-2016-2845"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2016:0359"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"ARTICLE","url":"http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1314214"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1314215"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1314216"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1314217"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1314218"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1314219"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1314220"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1314221"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1314222"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1314224"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1314225"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1314226"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1314227"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_0359.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-1630"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-1630"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1630"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-1631"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-1631"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1631"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-1632"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-1632"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1632"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-1633"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-1633"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1633"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-1634"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-1634"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1634"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-1635"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-1635"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1635"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-1636"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-1636"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1636"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-1637"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-1637"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1637"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-1638"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-1638"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1638"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-1639"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-1639"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1639"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-1640"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-1640"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1640"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-1641"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-1641"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1641"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-1642"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-1642"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1642"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-2843"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1315359"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-2843"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-2843"},{"type":"ARTICLE","url":"http://googlechromereleases.blogspot.cz/2016/03/stable-channel-update.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-2844"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1315361"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-2844"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-2844"},{"type":"ARTICLE","url":"https://codereview.chromium.org/1423573002"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-2845"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1315362"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-2845"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-2845"},{"type":"ARTICLE","url":"https://codereview.chromium.org/1454003003/"}],"affected":[{"package":{"name":"chromium-browser","ecosystem":"Red Hat:rhel_extras:6","purl":"pkg:rpm/redhat/chromium-browser"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:49.0.2623.75-1.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:0359.json"}},{"package":{"name":"chromium-browser-debuginfo","ecosystem":"Red Hat:rhel_extras:6","purl":"pkg:rpm/redhat/chromium-browser-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:49.0.2623.75-1.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:0359.json"}}],"schema_version":"1.7.3"}