Linux Security
Linux Security
Linux Security

Fedora 33: chromium 2020-10ec8aca61

Date 21 Nov 2020
655
Posted By LinuxSecurity Advisories
Update to 87.0.4280.66. Fixes bugs and security holes. Yay! CVE-2020-16012 CVE-2020-16018 CVE-2020-16019 CVE-2020-16020 CVE-2020-16021 CVE-2020-16022 CVE-2020-16015 CVE-2020-16014 CVE-2020-16023 CVE-2020-16024 CVE-2020-16025 CVE-2020-16026 CVE-2020-16027 CVE-2020-16028 CVE-2020-16029 CVE-2020-16030 CVE-2020-16031 CVE-2020-16032 CVE-2020-16033 CVE-2020-16034 CVE-2020-16035
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2020-10ec8aca61
2020-11-22 01:24:25.184407
--------------------------------------------------------------------------------

Name        : chromium
Product     : Fedora 33
Version     : 87.0.4280.66
Release     : 1.fc33
URL         : https://www.chromium.org/Home
Summary     : A WebKit (Blink) powered web browser
Description :
Chromium is an open-source web browser, powered by WebKit (Blink).

--------------------------------------------------------------------------------
Update Information:

Update to 87.0.4280.66. Fixes bugs and security holes. Yay!  CVE-2020-16012
CVE-2020-16018 CVE-2020-16019 CVE-2020-16020 CVE-2020-16021 CVE-2020-16022
CVE-2020-16015  CVE-2020-16014 CVE-2020-16023 CVE-2020-16024 CVE-2020-16025
CVE-2020-16026 CVE-2020-16027 CVE-2020-16028  CVE-2020-16029 CVE-2020-16030
CVE-2020-16031 CVE-2020-16032 CVE-2020-16033 CVE-2020-16034 CVE-2020-16035
CVE-2020-16036
--------------------------------------------------------------------------------
ChangeLog:

* Wed Nov 18 2020 Tom Callaway  - 87.0.4280.66-1
- update to 87.0.4280.66
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1899222 - CVE-2020-16018 chromium-browser: Use after free in payments
        https://bugzilla.redhat.com/show_bug.cgi?id=1899222
  [ 2 ] Bug #1899223 - CVE-2020-16019 chromium-browser: Inappropriate implementation in filesystem
        https://bugzilla.redhat.com/show_bug.cgi?id=1899223
  [ 3 ] Bug #1899224 - CVE-2020-16020 chromium-browser: Inappropriate implementation in cryptohome
        https://bugzilla.redhat.com/show_bug.cgi?id=1899224
  [ 4 ] Bug #1899225 - CVE-2020-16021 chromium-browser: Race in ImageBurner
        https://bugzilla.redhat.com/show_bug.cgi?id=1899225
  [ 5 ] Bug #1899226 - CVE-2020-16022 chromium-browser: Insufficient policy enforcement in networking
        https://bugzilla.redhat.com/show_bug.cgi?id=1899226
  [ 6 ] Bug #1899227 - CVE-2020-16015 chromium-browser: Insufficient data validation in WASM
        https://bugzilla.redhat.com/show_bug.cgi?id=1899227
  [ 7 ] Bug #1899228 - CVE-2020-16014 chromium-browser: Use after free in PPAPI
        https://bugzilla.redhat.com/show_bug.cgi?id=1899228
  [ 8 ] Bug #1899229 - CVE-2020-16023 chromium-browser: Use after free in WebCodecs
        https://bugzilla.redhat.com/show_bug.cgi?id=1899229
  [ 9 ] Bug #1899230 - CVE-2020-16024 chromium-browser: Heap buffer overflow in UI
        https://bugzilla.redhat.com/show_bug.cgi?id=1899230
  [ 10 ] Bug #1899231 - CVE-2020-16025 chromium-browser: Heap buffer overflow in clipboard
        https://bugzilla.redhat.com/show_bug.cgi?id=1899231
  [ 11 ] Bug #1899232 - CVE-2020-16026 chromium-browser: Use after free in WebRTC
        https://bugzilla.redhat.com/show_bug.cgi?id=1899232
  [ 12 ] Bug #1899233 - CVE-2020-16027 chromium-browser: Insufficient policy enforcement in developer tools
        https://bugzilla.redhat.com/show_bug.cgi?id=1899233
  [ 13 ] Bug #1899234 - CVE-2020-16028 chromium-browser: Heap buffer overflow in WebRTC
        https://bugzilla.redhat.com/show_bug.cgi?id=1899234
  [ 14 ] Bug #1899235 - CVE-2020-16029 chromium-browser: Inappropriate implementation in PDFium
        https://bugzilla.redhat.com/show_bug.cgi?id=1899235
  [ 15 ] Bug #1899237 - CVE-2020-16030 chromium-browser: Insufficient data validation in Blink
        https://bugzilla.redhat.com/show_bug.cgi?id=1899237
  [ 16 ] Bug #1899239 - CVE-2019-8075 flash-plugin: Same origin policy bypass leading to information disclosure
        https://bugzilla.redhat.com/show_bug.cgi?id=1899239
  [ 17 ] Bug #1899240 - CVE-2020-16031 chromium-browser: Incorrect security UI in tab preview
        https://bugzilla.redhat.com/show_bug.cgi?id=1899240
  [ 18 ] Bug #1899241 - CVE-2020-16032 chromium-browser: Incorrect security UI in sharing
        https://bugzilla.redhat.com/show_bug.cgi?id=1899241
  [ 19 ] Bug #1899242 - CVE-2020-16033 chromium-browser: Incorrect security UI in WebUSB
        https://bugzilla.redhat.com/show_bug.cgi?id=1899242
  [ 20 ] Bug #1899243 - CVE-2020-16034 chromium-browser: Inappropriate implementation in WebRTC
        https://bugzilla.redhat.com/show_bug.cgi?id=1899243
  [ 21 ] Bug #1899244 - CVE-2020-16035 chromium-browser: Insufficient data validation in cros-disks
        https://bugzilla.redhat.com/show_bug.cgi?id=1899244
  [ 22 ] Bug #1899245 - CVE-2020-16036 chromium-browser: Inappropriate implementation in cookies
        https://bugzilla.redhat.com/show_bug.cgi?id=1899245
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2020-10ec8aca61' at the command
line. For more information, refer to the dnf documentation available at
https://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list -- This email address is being protected from spambots. You need JavaScript enabled to view it.
To unsubscribe send an email to This email address is being protected from spambots. You need JavaScript enabled to view it.
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/This email address is being protected from spambots. You need JavaScript enabled to view it.

Advisories

LinuxSecurity Poll

How frequently do you patch/update your system?

No answer selected. Please try again.
Please select either existing option or enter your own, however not both.
Please select minimum 0 answer(s) and maximum 3 answer(s).
/main-polls/52-how-frequently-do-you-patch-update-your-system?task=poll.vote&format=json
52
radio
[{"id":"179","title":"As soon as patches\/updates are released - I track advisories for my distro(s) diligently","votes":"66","type":"x","order":"1","pct":75.86,"resources":[]},{"id":"180","title":"Every so often, when I think of it","votes":"14","type":"x","order":"2","pct":16.09,"resources":[]},{"id":"181","title":"Hardly ever","votes":"7","type":"x","order":"3","pct":8.05,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

Please vote first in order to view vote results.

VOTE ON THE POLL PAGE


VIEW MORE POLLS

bottom 200

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.