Fedora Linux 8772 Published by

A chromium security update has been released for Fedora Linux 37.



[SECURITY] Fedora 37 Update: chromium-119.0.6045.105-1.fc37


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2023-14b8d5c44f
2023-11-08 01:18:36.666927
--------------------------------------------------------------------------------

Name : chromium
Product : Fedora 37
Version : 119.0.6045.105
Release : 1.fc37
URL : http://www.chromium.org/Home
Summary : A WebKit (Blink) powered web browser that Google doesn't want you to use
Description :
Chromium is an open-source web browser, powered by WebKit (Blink).

--------------------------------------------------------------------------------
Update Information:

update to 119.0.6045.105. Security fixes: High CVE-2023-5480: Inappropriate
implementation in Payments. High CVE-2023-5482: Insufficient data validation
in USB. High CVE-2023-5849: Integer overflow in USB. Medium
CVE-2023-5850: Incorrect security UI in Downloads. Medium CVE-2023-5851:
Inappropriate implementation in Downloads. Medium CVE-2023-5852: Use after
free in Printing. Medium CVE-2023-5853: Incorrect security UI in Downloads.
Medium CVE-2023-5854: Use after free in Profiles. Medium CVE-2023-5855: Use
after free in Reading Mode. Medium CVE-2023-5856: Use after free in Side
Panel. Medium CVE-2023-5857: Inappropriate implementation in Downloads.
Low CVE-2023-5858: Inappropriate implementation in WebApp Provider. Low
CVE-2023-5859: Incorrect security UI in Picture In Picture.
--------------------------------------------------------------------------------
ChangeLog:

* Wed Nov 1 2023 Than Ngo [than@redhat.com] - 119.0.6045.105-1
- update to 119.0.6045.105
* Fri Oct 27 2023 Than Ngo [than@redhat.com] - 119.0.6045.59-1
- update 119.0.6045.59
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2247403 - CVE-2023-5480 chromium: chromium-browser: Inappropriate implementation in Payments [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2247403
[ 2 ] Bug #2247404 - CVE-2023-5480 chromium: chromium-browser: Inappropriate implementation in Payments [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2247404
[ 3 ] Bug #2247405 - CVE-2023-5482 chromium: chromium-browser: Insufficient data validation in USB [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2247405
[ 4 ] Bug #2247406 - CVE-2023-5482 chromium: chromium-browser: Insufficient data validation in USB [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2247406
[ 5 ] Bug #2247408 - CVE-2023-5849 chromium: chromium-browser: Integer overflow in USB [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2247408
[ 6 ] Bug #2247409 - CVE-2023-5849 chromium: chromium-browser: Integer overflow in USB [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2247409
[ 7 ] Bug #2247410 - CVE-2023-5850 chromium: chromium-browser: Incorrect security UI in Downloads [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2247410
[ 8 ] Bug #2247411 - CVE-2023-5850 chromium: chromium-browser: Incorrect security UI in Downloads [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2247411
[ 9 ] Bug #2247412 - CVE-2023-5851 chromium: chromium-browser: Inappropriate implementation in Downloads [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2247412
[ 10 ] Bug #2247413 - CVE-2023-5851 chromium: chromium-browser: Inappropriate implementation in Downloads [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2247413
[ 11 ] Bug #2247414 - CVE-2023-5852 chromium: chromium-browser: Use after free in Printing [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2247414
[ 12 ] Bug #2247415 - CVE-2023-5852 chromium: chromium-browser: Use after free in Printing [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2247415
[ 13 ] Bug #2247416 - CVE-2023-5853 chromium: chromium-browser: Incorrect security UI in Downloads [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2247416
[ 14 ] Bug #2247417 - CVE-2023-5853 chromium: chromium-browser: Incorrect security UI in Downloads [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2247417
[ 15 ] Bug #2247418 - CVE-2023-5854 chromium: chromium-browser: Use after free in Profiles [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2247418
[ 16 ] Bug #2247419 - CVE-2023-5855 chromium: chromium-browser: Use after free in Reading Mode [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2247419
[ 17 ] Bug #2247420 - CVE-2023-5854 chromium: chromium-browser: Use after free in Profiles [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2247420
[ 18 ] Bug #2247421 - CVE-2023-5855 chromium: chromium-browser: Use after free in Reading Mode [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2247421
[ 19 ] Bug #2247422 - CVE-2023-5856 chromium: chromium-browser: Use after free in Side Panel [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2247422
[ 20 ] Bug #2247423 - CVE-2023-5856 chromium: chromium-browser: Use after free in Side Panel [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2247423
[ 21 ] Bug #2247424 - CVE-2023-5858 chromium: chromium-browser: Inappropriate implementation in WebApp Provider [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2247424
[ 22 ] Bug #2247425 - CVE-2023-5859 chromium: chromium-browser: Incorrect security UI in Picture In Picture [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2247425
[ 23 ] Bug #2247426 - CVE-2023-5858 chromium: chromium-browser: Inappropriate implementation in WebApp Provider [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2247426
[ 24 ] Bug #2247429 - CVE-2023-5857 chromium: chromium-browser: Inappropriate implementation in Downloads [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2247429
[ 25 ] Bug #2247430 - CVE-2023-5857 chromium: chromium-browser: Inappropriate implementation in Downloads [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2247430
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2023-14b8d5c44f' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------