[SECURITY] Fedora 38 Update: chromium-117.0.5938.62-1.fc38

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2023-3bfb63f6d2
2023-09-18 01:24:24.505587
--------------------------------------------------------------------------------

Name        : chromium
Product     : Fedora 38
Version     : 117.0.5938.62
Release     : 1.fc38
URL         : http://www.chromium.org/Home
Summary     : A WebKit (Blink) powered web browser that Google doesn't want you to use
Description :
Chromium is an open-source web browser, powered by WebKit (Blink).

--------------------------------------------------------------------------------
Update Information:

update to 117.0.5938.62. Fixes following security issues:   CVE-2023-4900
CVE-2023-4901 CVE-2023-4902 CVE-2023-4903 CVE-2023-4904  CVE-2023-4905
CVE-2023-4906 CVE-2023-4907 CVE-2023-4908 CVE-2023-4909  ----  update to
116.0.5845.187. Fixes following security issue: CVE-2023-4863  ----  update to
116.0.5845.179. Fixes following security issues: CVE-2023-4427 CVE-2023-4428
CVE-2023-4429 CVE-2023-4430 CVE-2023-4431 CVE-2023-4572 CVE-2023-4761
CVE-2023-4762 CVE-2023-4763 CVE-2023-4764
--------------------------------------------------------------------------------
ChangeLog:

* Wed Sep 13 2023 Than Ngo <than@xxxxxxxxxx> - 117.0.5938.62-1
- update to 117.0.5938.62
* Tue Sep 12 2023 Than Ngo <than@xxxxxxxxxx> - 116.0.5845.187-1
- update to 116.0.5845.187
* Fri Sep  8 2023 Than Ngo <than@xxxxxxxxxx> - 116.0.5845.179-1
- update to 116.0.5845.179
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #2234749 - CVE-2023-4427 CVE-2023-4428 CVE-2023-4429 CVE-2023-4430 CVE-2023-4431 chromium: various flaws [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=2234749
  [ 2 ] Bug #2234750 - CVE-2023-4427 CVE-2023-4428 CVE-2023-4429 CVE-2023-4430 CVE-2023-4431 chromium: various flaws [epel-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=2234750
  [ 3 ] Bug #2235800 - CVE-2023-4572 chromium: chromium-browser: Use after free in MediaStream [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=2235800
  [ 4 ] Bug #2235801 - CVE-2023-4572 chromium: chromium-browser: Use after free in MediaStream [epel-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=2235801
  [ 5 ] Bug #2236152 - CVE-2021-29390 chromium: libjpeg-turbo: heap-buffer-overflow vulnerability in decompress_smooth_data in jdcoefct.c [epel-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=2236152
  [ 6 ] Bug #2237509 - CVE-2023-4761 CVE-2023-4762 CVE-2023-4763 CVE-2023-4764 chromium: various flaws [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=2237509
  [ 7 ] Bug #2237510 - CVE-2023-4761 CVE-2023-4762 CVE-2023-4763 CVE-2023-4764 chromium: various flaws [epel-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=2237510
  [ 8 ] Bug #2238432 - CVE-2023-4863 chromium: chromium-browser: Heap buffer overflow in WebP [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=2238432
  [ 9 ] Bug #2238433 - CVE-2023-4863 chromium: chromium-browser: Heap buffer overflow in WebP [epel-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=2238433
  [ 10 ] Bug #2238832 - CVE-2023-4900 CVE-2023-4901 CVE-2023-4902 CVE-2023-4903 CVE-2023-4904 CVE-2023-4905 CVE-2023-4906 CVE-2023-4907 CVE-2023-4908 CVE-2023-4909 chromium: various flaws [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=2238832
  [ 11 ] Bug #2238833 - CVE-2023-4900 CVE-2023-4901 CVE-2023-4902 CVE-2023-4903 CVE-2023-4904 CVE-2023-4905 CVE-2023-4906 CVE-2023-4907 CVE-2023-4908 CVE-2023-4909 chromium: various flaws [epel-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=2238833
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2023-3bfb63f6d2' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list -- package-announce@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to package-announce-leave@xxxxxxxxxxxxxxxxxxxxxxx
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@xxxxxxxxxxxxxxxxxxxxxxx
Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue




[Index of Archives]     [Fedora Users]     [Fedora Legacy]     [Fedora Desktop]     [Fedora SELinux]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Photos]     [KDE Users]

  Powered by Linux