--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2019-9a5e81214f
2019-10-26 17:17:38.272991
--------------------------------------------------------------------------------
Name : chromium
Product : Fedora 31
Version : 77.0.3865.120
Release : 1.fc31
URL :
http://www.chromium.org/Home
Summary : A WebKit (Blink) powered web browser
Description :
Chromium is an open-source web browser, powered by WebKit (Blink).
--------------------------------------------------------------------------------
Update Information:
Chromium update to 77.0.3865.120. For the upstream announcement see
https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-
desktop.html.
--------------------------------------------------------------------------------
ChangeLog:
* Mon Oct 14 2019 Tomas Popela <tpopela(a)redhat.com> - 77.0.3865.120-1
- Update to 77.0.3865.120
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #1762385 - CVE-2019-13664 chromium-browser: CSRF bypass
https://bugzilla.redhat.com/show_bug.cgi?id=1762385
[ 2 ] Bug #1762384 - CVE-2019-13663 chromium-browser: IDN spoof
https://bugzilla.redhat.com/show_bug.cgi?id=1762384
[ 3 ] Bug #1762383 - CVE-2019-13662 chromium-browser: CSP bypass
https://bugzilla.redhat.com/show_bug.cgi?id=1762383
[ 4 ] Bug #1762382 - CVE-2019-13661 chromium-browser: Full screen notification spoof
https://bugzilla.redhat.com/show_bug.cgi?id=1762382
[ 5 ] Bug #1762381 - CVE-2019-13660 chromium-browser: Full screen notification overlap
https://bugzilla.redhat.com/show_bug.cgi?id=1762381
[ 6 ] Bug #1762380 - CVE-2019-13659 chromium-browser: URL spoof
https://bugzilla.redhat.com/show_bug.cgi?id=1762380
[ 7 ] Bug #1762379 - CVE-2019-5881 chromium-browser: Arbitrary read in SwiftShader
https://bugzilla.redhat.com/show_bug.cgi?id=1762379
[ 8 ] Bug #1762378 - CVE-2019-5880 chromium-browser: SameSite cookie bypass
https://bugzilla.redhat.com/show_bug.cgi?id=1762378
[ 9 ] Bug #1762377 - CVE-2019-5879 chromium-browser: Extensions can read some local
files
https://bugzilla.redhat.com/show_bug.cgi?id=1762377
[ 10 ] Bug #1762376 - CVE-2019-5878 chromium-browser: Use-after-free in V8
https://bugzilla.redhat.com/show_bug.cgi?id=1762376
[ 11 ] Bug #1762375 - CVE-2019-5877 chromium-browser: Out-of-bounds access in V8
https://bugzilla.redhat.com/show_bug.cgi?id=1762375
[ 12 ] Bug #1762374 - CVE-2019-5876 chromium-browser: Use-after-free in media
https://bugzilla.redhat.com/show_bug.cgi?id=1762374
[ 13 ] Bug #1762373 - CVE-2019-13692 chromium-browser: SOP bypass
https://bugzilla.redhat.com/show_bug.cgi?id=1762373
[ 14 ] Bug #1762372 - CVE-2019-13691 chromium-browser: Omnibox spoof
https://bugzilla.redhat.com/show_bug.cgi?id=1762372
[ 15 ] Bug #1762371 - CVE-2019-5875 chromium-browser: URL bar spoof via download
redirect
https://bugzilla.redhat.com/show_bug.cgi?id=1762371
[ 16 ] Bug #1762370 - CVE-2019-5874 chromium-browser: External URIs may trigger other
browsers
https://bugzilla.redhat.com/show_bug.cgi?id=1762370
[ 17 ] Bug #1762369 - CVE-2019-5873 chromium-browser: URL bar spoofing on iOS
https://bugzilla.redhat.com/show_bug.cgi?id=1762369
[ 18 ] Bug #1762368 - CVE-2019-5872 chromium-browser: Use-after-free in Mojo
https://bugzilla.redhat.com/show_bug.cgi?id=1762368
[ 19 ] Bug #1762367 - CVE-2019-5871 chromium-browser: Heap overflow in Skia
https://bugzilla.redhat.com/show_bug.cgi?id=1762367
[ 20 ] Bug #1762366 - CVE-2019-5870 chromium-browser: Use-after-free in media
https://bugzilla.redhat.com/show_bug.cgi?id=1762366
[ 21 ] Bug #1762403 - CVE-2019-13683 chromium-browser: Exceptions leaked by devtools
https://bugzilla.redhat.com/show_bug.cgi?id=1762403
[ 22 ] Bug #1762402 - CVE-2019-13682 chromium-browser: Site isolation bypass
https://bugzilla.redhat.com/show_bug.cgi?id=1762402
[ 23 ] Bug #1762401 - CVE-2019-13681 chromium-browser: Bypass on download restrictions
https://bugzilla.redhat.com/show_bug.cgi?id=1762401
[ 24 ] Bug #1762400 - CVE-2019-13680 chromium-browser: IP address spoofing to servers
https://bugzilla.redhat.com/show_bug.cgi?id=1762400
[ 25 ] Bug #1762399 - CVE-2019-13679 chromium-browser: User gesture needed for printing
https://bugzilla.redhat.com/show_bug.cgi?id=1762399
[ 26 ] Bug #1762398 - CVE-2019-13678 chromium-browser: Download dialog spoofing
https://bugzilla.redhat.com/show_bug.cgi?id=1762398
[ 27 ] Bug #1762397 - CVE-2019-13677 chromium-browser: Chrome web store origin needs to
be isolated
https://bugzilla.redhat.com/show_bug.cgi?id=1762397
[ 28 ] Bug #1762396 - CVE-2019-13676 chromium-browser: Google URI shown for certificate
warning
https://bugzilla.redhat.com/show_bug.cgi?id=1762396
[ 29 ] Bug #1762395 - CVE-2019-13675 chromium-browser: Extensions can be disabled by
trailing slash
https://bugzilla.redhat.com/show_bug.cgi?id=1762395
[ 30 ] Bug #1762394 - CVE-2019-13674 chromium-browser: IDN spoofing
https://bugzilla.redhat.com/show_bug.cgi?id=1762394
[ 31 ] Bug #1762393 - CVE-2019-13673 chromium-browser: Cross-origin information leak
using devtools
https://bugzilla.redhat.com/show_bug.cgi?id=1762393
[ 32 ] Bug #1762392 - CVE-2019-13671 chromium-browser: Dialog box fails to show origin
https://bugzilla.redhat.com/show_bug.cgi?id=1762392
[ 33 ] Bug #1762391 - CVE-2019-13670 chromium-browser: V8 memory corruption in regex
https://bugzilla.redhat.com/show_bug.cgi?id=1762391
[ 34 ] Bug #1762390 - CVE-2019-13669 chromium-browser: HTTP authentication spoof
https://bugzilla.redhat.com/show_bug.cgi?id=1762390
[ 35 ] Bug #1762389 - CVE-2019-13668 chromium-browser: Global window leak via console
https://bugzilla.redhat.com/show_bug.cgi?id=1762389
[ 36 ] Bug #1762388 - CVE-2019-13667 chromium-browser: URI bar spoof when using external
app URIs
https://bugzilla.redhat.com/show_bug.cgi?id=1762388
[ 37 ] Bug #1762387 - CVE-2019-13666 chromium-browser: Side channel using storage size
estimate
https://bugzilla.redhat.com/show_bug.cgi?id=1762387
[ 38 ] Bug #1762386 - CVE-2019-13665 chromium-browser: Multiple file download protection
bypass
https://bugzilla.redhat.com/show_bug.cgi?id=1762386
--------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2019-9a5e81214f' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------