-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2023-0cd03c3746 2023-10-02 00:40:09.594998 --------------------------------------------------------------------------------
Name : chromium Product : Fedora 37 Version : 117.0.5938.132 Release : 1.fc37 URL : http://www.chromium.org/Home Summary : A WebKit (Blink) powered web browser that Google doesn't want you to use Description : Chromium is an open-source web browser, powered by WebKit (Blink).
-------------------------------------------------------------------------------- Update Information:
update to 117.0.5938.132. Fixes following security issues: CVE-2023-5129 CVE-2023-5186 -------------------------------------------------------------------------------- ChangeLog:
* Thu Sep 28 2023 Than Ngo than@redhat.com - 117.0.5938.132-1 - update to 117.0.5938.132 - CVE-2023-5217, heap buffer overflow in vp8 encoding in libvpx. - CVE-2023-5186, use after free in Passwords. - CVE-2023-5187, use after free in Extensions. ��� -------------------------------------------------------------------------------- References:
[ 1 ] Bug #2239523 - chromium chrashes with SIGILL on BTI capable systems (Apple M2) https://bugzilla.redhat.com/show_bug.cgi?id=2239523 [ 2 ] Bug #2241119 - CVE-2023-5129 chromium: libwebp: out-of-bounds write with a specially crafted WebP lossless file [epel-all] https://bugzilla.redhat.com/show_bug.cgi?id=2241119 [ 3 ] Bug #2241120 - CVE-2023-5129 chromium: libwebp: out-of-bounds write with a specially crafted WebP lossless file [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2241120 [ 4 ] Bug #2241194 - CVE-2023-5186 CVE-2023-5187 CVE-2023-5217 chromium: various flaws [epel-all] https://bugzilla.redhat.com/show_bug.cgi?id=2241194 [ 5 ] Bug #2241195 - CVE-2023-5186 CVE-2023-5187 CVE-2023-5217 chromium: various flaws [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2241195 --------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2023-0cd03c3746' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys --------------------------------------------------------------------------------