[SECURITY] Fedora 40 Update: chromium-128.0.6613.137-1.fc40

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2024-0a4a65f805
2024-09-14 01:57:36.689629
--------------------------------------------------------------------------------

Name        : chromium
Product     : Fedora 40
Version     : 128.0.6613.137
Release     : 1.fc40
URL         : http://www.chromium.org/Home
Summary     : A WebKit (Blink) powered web browser that Google doesn't want you to use
Description :
Chromium is an open-source web browser, powered by WebKit (Blink).

--------------------------------------------------------------------------------
Update Information:

update to 128.0.6613.137
  * High CVE-2024-8636: Heap buffer overflow in Skia
  * High CVE-2024-8637: Use after free in Media Router
  * High CVE-2024-8638: Type Confusion in V8
  * High CVE-2024-8639: Use after free in Autofill
--------------------------------------------------------------------------------
ChangeLog:

* Wed Sep 11 2024 Than Ngo <than@xxxxxxxxxx> - 128.0.6613.137-1
- update to 128.0.6613.137
  * High CVE-2024-8636: Heap buffer overflow in Skia
  * High CVE-2024-8637: Use after free in Media Router
  * High CVE-2024-8638: Type Confusion in V8
  * High CVE-2024-8639: Use after free in Autofill
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #2311182 - CVE-2024-45590 chromium: Denial of Service Vulnerability in body-parser [epel-8]
        https://bugzilla.redhat.com/show_bug.cgi?id=2311182
  [ 2 ] Bug #2311196 - CVE-2024-45590 chromium: Denial of Service Vulnerability in body-parser [fedora-39]
        https://bugzilla.redhat.com/show_bug.cgi?id=2311196
  [ 3 ] Bug #2311225 - CVE-2024-45590 chromium: Denial of Service Vulnerability in body-parser [fedora-40]
        https://bugzilla.redhat.com/show_bug.cgi?id=2311225
  [ 4 ] Bug #2311373 - CVE-2024-43796 chromium: Improper Input Handling in Express Redirects [epel-8]
        https://bugzilla.redhat.com/show_bug.cgi?id=2311373
  [ 5 ] Bug #2311378 - CVE-2024-43796 chromium: Improper Input Handling in Express Redirects [fedora-39]
        https://bugzilla.redhat.com/show_bug.cgi?id=2311378
  [ 6 ] Bug #2311393 - CVE-2024-43796 chromium: Improper Input Handling in Express Redirects [fedora-40]
        https://bugzilla.redhat.com/show_bug.cgi?id=2311393
  [ 7 ] Bug #2311684 - CVE-2024-8636 chromium: Heap buffer overflow in Skia [epel-8]
        https://bugzilla.redhat.com/show_bug.cgi?id=2311684
  [ 8 ] Bug #2311685 - CVE-2024-8636 chromium: Heap buffer overflow in Skia [fedora-39]
        https://bugzilla.redhat.com/show_bug.cgi?id=2311685
  [ 9 ] Bug #2311686 - CVE-2024-8636 chromium: Heap buffer overflow in Skia [fedora-40]
        https://bugzilla.redhat.com/show_bug.cgi?id=2311686
  [ 10 ] Bug #2311690 - CVE-2024-8638 chromium: Type Confusion in V8 in Google Chrome [epel-8]
        https://bugzilla.redhat.com/show_bug.cgi?id=2311690
  [ 11 ] Bug #2311692 - CVE-2024-8638 chromium: Type Confusion in V8 in Google Chrome [fedora-39]
        https://bugzilla.redhat.com/show_bug.cgi?id=2311692
  [ 12 ] Bug #2311693 - CVE-2024-8638 chromium: Type Confusion in V8 in Google Chrome [fedora-40]
        https://bugzilla.redhat.com/show_bug.cgi?id=2311693
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2024-0a4a65f805' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------

-- 
_______________________________________________
package-announce mailing list -- package-announce@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to package-announce-leave@xxxxxxxxxxxxxxxxxxxxxxx
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@xxxxxxxxxxxxxxxxxxxxxxx
Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue




[Index of Archives]     [Fedora Users]     [Fedora Legacy]     [Fedora Desktop]     [Fedora SELinux]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Photos]     [KDE Users]

  Powered by Linux