Fedora 41 Update: qt6-qtwebengine-6.8.2-4.fc41
Fedora 41 Update: chromium-134.0.6998.35-1.fc41
[SECURITY] Fedora 41 Update: qt6-qtwebengine-6.8.2-4.fc41
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2025-c858874183
2025-03-09 02:15:24.080035+00:00
--------------------------------------------------------------------------------
Name : qt6-qtwebengine
Product : Fedora 41
Version : 6.8.2
Release : 4.fc41
URL : http://www.qt.io
Summary : Qt6 - QtWebEngine components
Description :
Qt6 - QtWebEngine components.
--------------------------------------------------------------------------------
Update Information:
Unbundle libxml2.
--------------------------------------------------------------------------------
ChangeLog:
* Tue Mar 4 2025 Jan Grulich [jgrulich@redhat.com] - 6.8.2-4
- Unbundle libxml and libxslt
* Mon Mar 3 2025 Jan Grulich [jgrulich@redhat.com] - 6.8.2-3
- Rework OpenH264 support following Chromium package
- Backport upstream change for ffmpeg codec selection issues.
* Mon Feb 17 2025 Jan Grulich [jgrulich@redhat.com] - 6.8.2-2
- Bump build for ppc64le enablement
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #2280538 - CVE-2024-34459 qt6-qtwebengine: libxml2: buffer over-read in xmlHTMLPrintFileContext in xmllint.c [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2280538
--------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2025-c858874183' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
--
[SECURITY] Fedora 41 Update: chromium-134.0.6998.35-1.fc41
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2025-e94782e579
2025-03-09 02:15:24.080041+00:00
--------------------------------------------------------------------------------
Name : chromium
Product : Fedora 41
Version : 134.0.6998.35
Release : 1.fc41
URL : http://www.chromium.org/Home
Summary : A WebKit (Blink) powered web browser that Google doesn't want you to use
Description :
Chromium is an open-source web browser, powered by WebKit (Blink).
--------------------------------------------------------------------------------
Update Information:
Update to 134.0.6998.35
* CVE-2025-1914: Out of bounds read in V8
* CVE-2025-1915: Improper Limitation of a Pathname to a Restricted Directory
in DevTools
* CVE-2025-1916: Use after free in Profiles
* CVE-2025-1917: Inappropriate Implementation in Browser UI
* CVE-2025-1918: Out of bounds read in PDFium
* CVE-2025-1919: Out of bounds read in Media
* CVE-2025-1921: Inappropriate Implementation in Media Stream
* CVE-2025-1922: Inappropriate Implementation in Selection
* CVE-2025-1923: Inappropriate Implementation in Permission Prompts
--------------------------------------------------------------------------------
ChangeLog:
* Wed Mar 5 2025 Than Ngo [than@redhat.com] - 134.0.6998.35 -1
- Update to 134.0.6998.35
* CVE-2025-1914: Out of bounds read in V8
* CVE-2025-1915: Improper Limitation of a Pathname to a Restricted Directory in DevTools
* CVE-2025-1916: Use after free in Profiles
* CVE-2025-1917: Inappropriate Implementation in Browser UI
* CVE-2025-1918: Out of bounds read in PDFium
* CVE-2025-1919: Out of bounds read in Media
* CVE-2025-1921: Inappropriate Implementation in Media Stream
* CVE-2025-1922: Inappropriate Implementation in Selection
* CVE-2025-1923: Inappropriate Implementation in Permission Prompts
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #2349973 - CVE-2025-1914 chromium: From CVEorg collector [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2349973
[ 2 ] Bug #2349974 - CVE-2025-1914 chromium: From CVEorg collector [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2349974
[ 3 ] Bug #2350032 - CVE-2025-1921 chromium: Inappropriate implementation in Media Stream [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2350032
[ 4 ] Bug #2350033 - CVE-2025-1921 chromium: Inappropriate implementation in Media Stream [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2350033
[ 5 ] Bug #2350034 - CVE-2025-1918 chromium: Out of bounds read in PDFium [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2350034
[ 6 ] Bug #2350035 - CVE-2025-1918 chromium: Out of bounds read in PDFium [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2350035
[ 7 ] Bug #2350036 - CVE-2025-1923 chromium: Inappropriate implementation in Permission Prompts [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2350036
[ 8 ] Bug #2350037 - CVE-2025-1916 chromium: Use after free in Profiles [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2350037
[ 9 ] Bug #2350038 - CVE-2025-1923 chromium: Inappropriate implementation in Permission Prompts [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2350038
[ 10 ] Bug #2350039 - CVE-2025-1916 chromium: Use after free in Profiles [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2350039
[ 11 ] Bug #2350040 - CVE-2025-1915 chromium: Improper Limitation of a Pathname [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2350040
[ 12 ] Bug #2350041 - CVE-2025-1919 chromium: Out of bounds read in Media [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2350041
[ 13 ] Bug #2350042 - CVE-2025-1915 chromium: Improper Limitation of a Pathname [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2350042
[ 14 ] Bug #2350043 - CVE-2025-1919 chromium: Out of bounds read in Media [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2350043
--------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2025-e94782e579' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
--