--------------------------------------------------------------------------------Fedora Update Notification
FEDORA-2022-b49c9bc07a
2022-10-05 01:00:11.180903
--------------------------------------------------------------------------------Name        : chromium
Product     : Fedora 36
Version     : 105.0.5195.125
Release     : 2.fc36
URL         : https://www.chromium.org/Home/
Summary     : A WebKit (Blink) powered web browser that Google doesn't want you to use
Description :
Chromium is an open-source web browser, powered by WebKit (Blink).

--------------------------------------------------------------------------------Update Information:

Update to chromium-105.0.5195.125. This package only has minor changes... ah,
just kidding. Here is the pile of security issues it fixes:  CVE-2022-2007
CVE-2022-2008 CVE-2022-2010 CVE-2022-2011 CVE-2022-2603 CVE-2022-2604
CVE-2022-2605 CVE-2022-2606 CVE-2022-2607 CVE-2022-2608 CVE-2022-2609
CVE-2022-2610 CVE-2022-2611 CVE-2022-2612 CVE-2022-2613 CVE-2022-2614
CVE-2022-2615 CVE-2022-2616 CVE-2022-2617 CVE-2022-2618 CVE-2022-2619
CVE-2022-2620 CVE-2022-2621 CVE-2022-2622 CVE-2022-2623 CVE-2022-2624
CVE-2022-2852 CVE-2022-2854 CVE-2022-2855 CVE-2022-2857 CVE-2022-2858
CVE-2022-2853 CVE-2022-2856 CVE-2022-2859 CVE-2022-2860 CVE-2022-2861
CVE-2022-3038 CVE-2022-3039 CVE-2022-3040 CVE-2022-3041 CVE-2022-3042
CVE-2022-3043 CVE-2022-3044 CVE-2022-3045 CVE-2022-3046 CVE-2022-3071
CVE-2022-3047 CVE-2022-3048 CVE-2022-3049 CVE-2022-3050 CVE-2022-3051
CVE-2022-3052 CVE-2022-3053 CVE-2022-3054 CVE-2022-3055 CVE-2022-3056
CVE-2022-3057 CVE-2022-3058 CVE-2022-3075 CVE-2022-3195 CVE-2022-3196
CVE-2022-3197 CVE-2022-3198 CVE-2022-3199 CVE-2022-3200 CVE-2022-3201
--------------------------------------------------------------------------------ChangeLog:

* Fri Sep 23 2022 Tom Callaway  - 105.0.5195.125-2
- apply upstream fix for wayland menu misplacement bug
* Mon Sep 19 2022 Tom Callaway  - 105.0.5195.125-1
- update to 105.0.5195.125
* Thu Sep  1 2022 Tom Callaway  - 105.0.5195.52-1
- update to 105.0.5195.52
* Thu Aug 18 2022 Tom Callaway  - 104.0.5112.101-1
- update to 104.0.5112.101
* Wed Jul 20 2022 Fedora Release Engineering  - 103.0.5060.114-2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_37_Mass_Rebuild
--------------------------------------------------------------------------------References:

  [ 1 ] Bug #2095757 - CVE-2022-2007 chromium-browser: Use after free in WebGPU
        https://bugzilla.redhat.com/show_bug.cgi?id=2095757
  [ 2 ] Bug #2095759 - CVE-2022-2008 chromium-browser: Out of bounds memory access in WebGL
        https://bugzilla.redhat.com/show_bug.cgi?id=2095759
  [ 3 ] Bug #2095760 - CVE-2022-2010 chromium-browser: Out of bounds read in compositing
        https://bugzilla.redhat.com/show_bug.cgi?id=2095760
  [ 4 ] Bug #2095761 - CVE-2022-2011 chromium-browser: Use after free in ANGLE
        https://bugzilla.redhat.com/show_bug.cgi?id=2095761
  [ 5 ] Bug #2114693 - CVE-2022-2603 chromium-browser: Use after free in Omnibox
        https://bugzilla.redhat.com/show_bug.cgi?id=2114693
  [ 6 ] Bug #2114694 - CVE-2022-2604 chromium-browser: Use after free in Safe Browsing
        https://bugzilla.redhat.com/show_bug.cgi?id=2114694
  [ 7 ] Bug #2114695 - CVE-2022-2605 chromium-browser: Out of bounds read in Dawn
        https://bugzilla.redhat.com/show_bug.cgi?id=2114695
  [ 8 ] Bug #2114696 - CVE-2022-2606 chromium-browser: Use after free in Managed devices API
        https://bugzilla.redhat.com/show_bug.cgi?id=2114696
  [ 9 ] Bug #2114697 - CVE-2022-2607 chromium-browser: Use after free in Tab Strip
        https://bugzilla.redhat.com/show_bug.cgi?id=2114697
  [ 10 ] Bug #2114698 - CVE-2022-2608 chromium-browser: Use after free in Overview Mode
        https://bugzilla.redhat.com/show_bug.cgi?id=2114698
  [ 11 ] Bug #2114699 - CVE-2022-2609 chromium-browser: Use after free in Nearby Share
        https://bugzilla.redhat.com/show_bug.cgi?id=2114699
  [ 12 ] Bug #2114700 - CVE-2022-2610 chromium-browser: Insufficient policy enforcement in Background Fetch
        https://bugzilla.redhat.com/show_bug.cgi?id=2114700
  [ 13 ] Bug #2114701 - CVE-2022-2611 chromium-browser: Inappropriate implementation in Fullscreen API
        https://bugzilla.redhat.com/show_bug.cgi?id=2114701
  [ 14 ] Bug #2114702 - CVE-2022-2612 chromium-browser: Side-channel information leakage in Keyboard input
        https://bugzilla.redhat.com/show_bug.cgi?id=2114702
  [ 15 ] Bug #2114703 - CVE-2022-2613 chromium-browser: Use after free in Input
        https://bugzilla.redhat.com/show_bug.cgi?id=2114703
  [ 16 ] Bug #2114704 - CVE-2022-2614 chromium-browser: Use after free in Sign-In Flow
        https://bugzilla.redhat.com/show_bug.cgi?id=2114704
  [ 17 ] Bug #2114705 - CVE-2022-2615 chromium-browser: Insufficient policy enforcement in Cookies
        https://bugzilla.redhat.com/show_bug.cgi?id=2114705
  [ 18 ] Bug #2114706 - CVE-2022-2616 chromium-browser: Inappropriate implementation in Extensions API
        https://bugzilla.redhat.com/show_bug.cgi?id=2114706
  [ 19 ] Bug #2114707 - CVE-2022-2617 chromium-browser: Use after free in Extensions API
        https://bugzilla.redhat.com/show_bug.cgi?id=2114707
  [ 20 ] Bug #2114708 - CVE-2022-2618 chromium-browser: Insufficient validation of untrusted input in Internals
        https://bugzilla.redhat.com/show_bug.cgi?id=2114708
  [ 21 ] Bug #2114709 - CVE-2022-2619 chromium-browser: Insufficient validation of untrusted input in Settings
        https://bugzilla.redhat.com/show_bug.cgi?id=2114709
  [ 22 ] Bug #2114710 - CVE-2022-2620 chromium-browser: Use after free in WebUI
        https://bugzilla.redhat.com/show_bug.cgi?id=2114710
  [ 23 ] Bug #2114711 - CVE-2022-2621 chromium-browser: Use after free in Extensions
        https://bugzilla.redhat.com/show_bug.cgi?id=2114711
  [ 24 ] Bug #2114712 - CVE-2022-2622 chromium-browser: Insufficient validation of untrusted input in Safe Browsing
        https://bugzilla.redhat.com/show_bug.cgi?id=2114712
  [ 25 ] Bug #2114713 - CVE-2022-2623 chromium-browser: Use after free in Offline
        https://bugzilla.redhat.com/show_bug.cgi?id=2114713
  [ 26 ] Bug #2114714 - CVE-2022-2624 chromium-browser: Heap buffer overflow in PDF
        https://bugzilla.redhat.com/show_bug.cgi?id=2114714
  [ 27 ] Bug #2118934 - CVE-2022-2852 chromium-browser: Use after free in FedCM
        https://bugzilla.redhat.com/show_bug.cgi?id=2118934
  [ 28 ] Bug #2118935 - CVE-2022-2854 chromium-browser: Use after free in SwiftShader
        https://bugzilla.redhat.com/show_bug.cgi?id=2118935
  [ 29 ] Bug #2118936 - CVE-2022-2855 chromium-browser: Use after free in ANGLE
        https://bugzilla.redhat.com/show_bug.cgi?id=2118936
  [ 30 ] Bug #2118937 - CVE-2022-2857 chromium-browser: Use after free in Blink
        https://bugzilla.redhat.com/show_bug.cgi?id=2118937
  [ 31 ] Bug #2118938 - CVE-2022-2858 chromium-browser: Use after free in Sign-In Flow
        https://bugzilla.redhat.com/show_bug.cgi?id=2118938
  [ 32 ] Bug #2118939 - CVE-2022-2853 chromium-browser: Heap buffer overflow in Downloads
        https://bugzilla.redhat.com/show_bug.cgi?id=2118939
  [ 33 ] Bug #2118941 - CVE-2022-2856 chromium-browser: Insufficient validation of untrusted input in Intents
        https://bugzilla.redhat.com/show_bug.cgi?id=2118941
  [ 34 ] Bug #2118942 - CVE-2022-2859 chromium-browser: Use after free in Chrome OS Shell
        https://bugzilla.redhat.com/show_bug.cgi?id=2118942
  [ 35 ] Bug #2118943 - CVE-2022-2860 chromium-browser: Insufficient policy enforcement in Cookies
        https://bugzilla.redhat.com/show_bug.cgi?id=2118943
  [ 36 ] Bug #2118944 - CVE-2022-2861 chromium-browser: Inappropriate implementation in Extensions API
        https://bugzilla.redhat.com/show_bug.cgi?id=2118944
  [ 37 ] Bug #2123660 - CVE-2022-3038 chromium-browser: Use after free in Network Service
        https://bugzilla.redhat.com/show_bug.cgi?id=2123660
  [ 38 ] Bug #2123661 - CVE-2022-3039 chromium-browser: Use after free in WebSQL
        https://bugzilla.redhat.com/show_bug.cgi?id=2123661
  [ 39 ] Bug #2123662 - CVE-2022-3040 chromium-browser: Use after free in Layout
        https://bugzilla.redhat.com/show_bug.cgi?id=2123662
  [ 40 ] Bug #2123664 - CVE-2022-3041 chromium-browser: Use after free in WebSQL
        https://bugzilla.redhat.com/show_bug.cgi?id=2123664
  [ 41 ] Bug #2123665 - CVE-2022-3042 chromium-browser: Use after free in PhoneHub
        https://bugzilla.redhat.com/show_bug.cgi?id=2123665
  [ 42 ] Bug #2123666 - CVE-2022-3043 chromium-browser: Heap buffer overflow in Screen Capture
        https://bugzilla.redhat.com/show_bug.cgi?id=2123666
  [ 43 ] Bug #2123667 - CVE-2022-3044 chromium-browser: Inappropriate implementation in Site Isolation
        https://bugzilla.redhat.com/show_bug.cgi?id=2123667
  [ 44 ] Bug #2123668 - CVE-2022-3045 chromium-browser: Insufficient validation of untrusted input in V8
        https://bugzilla.redhat.com/show_bug.cgi?id=2123668
  [ 45 ] Bug #2123669 - CVE-2022-3046 chromium-browser: Use after free in Browser Tag
        https://bugzilla.redhat.com/show_bug.cgi?id=2123669
  [ 46 ] Bug #2123670 - CVE-2022-3071 chromium-browser: Use after free in Tab Strip
        https://bugzilla.redhat.com/show_bug.cgi?id=2123670
  [ 47 ] Bug #2123671 - CVE-2022-3047 chromium-browser: Insufficient policy enforcement in Extensions API
        https://bugzilla.redhat.com/show_bug.cgi?id=2123671
  [ 48 ] Bug #2123672 - CVE-2022-3048 chromium-browser: Inappropriate implementation in Chrome OS lockscreen
        https://bugzilla.redhat.com/show_bug.cgi?id=2123672
  [ 49 ] Bug #2123673 - CVE-2022-3049 chromium-browser: Use after free in SplitScreen
        https://bugzilla.redhat.com/show_bug.cgi?id=2123673
  [ 50 ] Bug #2123674 - CVE-2022-3050 chromium-browser: Heap buffer overflow in WebUI
        https://bugzilla.redhat.com/show_bug.cgi?id=2123674
  [ 51 ] Bug #2123675 - CVE-2022-3051 chromium-browser: Heap buffer overflow in Exosphere
        https://bugzilla.redhat.com/show_bug.cgi?id=2123675
  [ 52 ] Bug #2123676 - CVE-2022-3052 chromium-browser: Heap buffer overflow in Window Manager
        https://bugzilla.redhat.com/show_bug.cgi?id=2123676
  [ 53 ] Bug #2123677 - CVE-2022-3053 chromium-browser: Inappropriate implementation in Pointer Lock
        https://bugzilla.redhat.com/show_bug.cgi?id=2123677
  [ 54 ] Bug #2123678 - CVE-2022-3054 chromium-browser: Insufficient policy enforcement in DevTools
        https://bugzilla.redhat.com/show_bug.cgi?id=2123678
  [ 55 ] Bug #2123679 - CVE-2022-3055 chromium-browser: Use after free in Passwords
        https://bugzilla.redhat.com/show_bug.cgi?id=2123679
  [ 56 ] Bug #2123680 - CVE-2022-3056 chromium-browser: Insufficient policy enforcement in Content Security Policy
        https://bugzilla.redhat.com/show_bug.cgi?id=2123680
  [ 57 ] Bug #2123681 - CVE-2022-3057 chromium-browser: Inappropriate implementation in iframe Sandbox
        https://bugzilla.redhat.com/show_bug.cgi?id=2123681
  [ 58 ] Bug #2123683 - CVE-2022-3058 chromium-browser: Use after free in Sign-In Flow
        https://bugzilla.redhat.com/show_bug.cgi?id=2123683
  [ 59 ] Bug #2124154 - CVE-2022-3075 chromium-browser: Insufficient data validation in Mojo
        https://bugzilla.redhat.com/show_bug.cgi?id=2124154
  [ 60 ] Bug #2126918 - CVE-2022-3195 chromium-browser: Out of bounds write in Storage
        https://bugzilla.redhat.com/show_bug.cgi?id=2126918
  [ 61 ] Bug #2126919 - CVE-2022-3196 chromium-browser: Use after free in PDF
        https://bugzilla.redhat.com/show_bug.cgi?id=2126919
  [ 62 ] Bug #2126920 - CVE-2022-3197 chromium-browser: Use after free in PDF
        https://bugzilla.redhat.com/show_bug.cgi?id=2126920
  [ 63 ] Bug #2126921 - CVE-2022-3198 chromium-browser: Use after free in PDF
        https://bugzilla.redhat.com/show_bug.cgi?id=2126921
  [ 64 ] Bug #2126922 - CVE-2022-3199 chromium-browser: Use after free in Frames
        https://bugzilla.redhat.com/show_bug.cgi?id=2126922
  [ 65 ] Bug #2126923 - CVE-2022-3200 chromium-browser: Heap buffer overflow in Internals
        https://bugzilla.redhat.com/show_bug.cgi?id=2126923
  [ 66 ] Bug #2126924 - CVE-2022-3201 chromium-browser: Insufficient validation of untrusted input in DevTools
        https://bugzilla.redhat.com/show_bug.cgi?id=2126924
--------------------------------------------------------------------------------This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2022-b49c9bc07a' at the command
line. For more information, refer to the dnf documentation available at
https://dnf.readthedocs.io/en/latest/command_ref.html

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org
Do not reply to spam, report it: https://pagure.io/login/

Fedora 36: chromium 2022-b49c9bc07a

October 4, 2022
Update to chromium-105.0.5195.125

Summary

Chromium is an open-source web browser, powered by WebKit (Blink).

Update to chromium-105.0.5195.125. This package only has minor changes... ah,

just kidding. Here is the pile of security issues it fixes: CVE-2022-2007

CVE-2022-2008 CVE-2022-2010 CVE-2022-2011 CVE-2022-2603 CVE-2022-2604

CVE-2022-2605 CVE-2022-2606 CVE-2022-2607 CVE-2022-2608 CVE-2022-2609

CVE-2022-2610 CVE-2022-2611 CVE-2022-2612 CVE-2022-2613 CVE-2022-2614

CVE-2022-2615 CVE-2022-2616 CVE-2022-2617 CVE-2022-2618 CVE-2022-2619

CVE-2022-2620 CVE-2022-2621 CVE-2022-2622 CVE-2022-2623 CVE-2022-2624

CVE-2022-2852 CVE-2022-2854 CVE-2022-2855 CVE-2022-2857 CVE-2022-2858

CVE-2022-2853 CVE-2022-2856 CVE-2022-2859 CVE-2022-2860 CVE-2022-2861

CVE-2022-3038 CVE-2022-3039 CVE-2022-3040 CVE-2022-3041 CVE-2022-3042

CVE-2022-3043 CVE-2022-3044 CVE-2022-3045 CVE-2022-3046 CVE-2022-3071

CVE-2022-3047 CVE-2022-3048 CVE-2022-3049 CVE-2022-3050 CVE-2022-3051

CVE-2022-3052 CVE-2022-3053 CVE-2022-3054 CVE-2022-3055 CVE-2022-3056

CVE-2022-3057 CVE-2022-3058 CVE-2022-3075 CVE-2022-3195 CVE-2022-3196

CVE-2022-3197 CVE-2022-3198 CVE-2022-3199 CVE-2022-3200 CVE-2022-3201

* Fri Sep 23 2022 Tom Callaway - 105.0.5195.125-2

- apply upstream fix for wayland menu misplacement bug

* Mon Sep 19 2022 Tom Callaway - 105.0.5195.125-1

- update to 105.0.5195.125

* Thu Sep 1 2022 Tom Callaway - 105.0.5195.52-1

- update to 105.0.5195.52

* Thu Aug 18 2022 Tom Callaway - 104.0.5112.101-1

- update to 104.0.5112.101

* Wed Jul 20 2022 Fedora Release Engineering - 103.0.5060.114-2

- Rebuilt for https://fedoraproject.org/wiki/Fedora_37_Mass_Rebuild

[ 1 ] Bug #2095757 - CVE-2022-2007 chromium-browser: Use after free in WebGPU

https://bugzilla.redhat.com/show_bug.cgi?id=2095757

[ 2 ] Bug #2095759 - CVE-2022-2008 chromium-browser: Out of bounds memory access in WebGL

https://bugzilla.redhat.com/show_bug.cgi?id=2095759

[ 3 ] Bug #2095760 - CVE-2022-2010 chromium-browser: Out of bounds read in compositing

https://bugzilla.redhat.com/show_bug.cgi?id=2095760

[ 4 ] Bug #2095761 - CVE-2022-2011 chromium-browser: Use after free in ANGLE

https://bugzilla.redhat.com/show_bug.cgi?id=2095761

[ 5 ] Bug #2114693 - CVE-2022-2603 chromium-browser: Use after free in Omnibox

https://bugzilla.redhat.com/show_bug.cgi?id=2114693

[ 6 ] Bug #2114694 - CVE-2022-2604 chromium-browser: Use after free in Safe Browsing

https://bugzilla.redhat.com/show_bug.cgi?id=2114694

[ 7 ] Bug #2114695 - CVE-2022-2605 chromium-browser: Out of bounds read in Dawn

https://bugzilla.redhat.com/show_bug.cgi?id=2114695

[ 8 ] Bug #2114696 - CVE-2022-2606 chromium-browser: Use after free in Managed devices API

https://bugzilla.redhat.com/show_bug.cgi?id=2114696

[ 9 ] Bug #2114697 - CVE-2022-2607 chromium-browser: Use after free in Tab Strip

https://bugzilla.redhat.com/show_bug.cgi?id=2114697

[ 10 ] Bug #2114698 - CVE-2022-2608 chromium-browser: Use after free in Overview Mode

https://bugzilla.redhat.com/show_bug.cgi?id=2114698

[ 11 ] Bug #2114699 - CVE-2022-2609 chromium-browser: Use after free in Nearby Share

https://bugzilla.redhat.com/show_bug.cgi?id=2114699

[ 12 ] Bug #2114700 - CVE-2022-2610 chromium-browser: Insufficient policy enforcement in Background Fetch

https://bugzilla.redhat.com/show_bug.cgi?id=2114700

[ 13 ] Bug #2114701 - CVE-2022-2611 chromium-browser: Inappropriate implementation in Fullscreen API

https://bugzilla.redhat.com/show_bug.cgi?id=2114701

[ 14 ] Bug #2114702 - CVE-2022-2612 chromium-browser: Side-channel information leakage in Keyboard input

https://bugzilla.redhat.com/show_bug.cgi?id=2114702

[ 15 ] Bug #2114703 - CVE-2022-2613 chromium-browser: Use after free in Input

https://bugzilla.redhat.com/show_bug.cgi?id=2114703

[ 16 ] Bug #2114704 - CVE-2022-2614 chromium-browser: Use after free in Sign-In Flow

https://bugzilla.redhat.com/show_bug.cgi?id=2114704

[ 17 ] Bug #2114705 - CVE-2022-2615 chromium-browser: Insufficient policy enforcement in Cookies

https://bugzilla.redhat.com/show_bug.cgi?id=2114705

[ 18 ] Bug #2114706 - CVE-2022-2616 chromium-browser: Inappropriate implementation in Extensions API

https://bugzilla.redhat.com/show_bug.cgi?id=2114706

[ 19 ] Bug #2114707 - CVE-2022-2617 chromium-browser: Use after free in Extensions API

https://bugzilla.redhat.com/show_bug.cgi?id=2114707

[ 20 ] Bug #2114708 - CVE-2022-2618 chromium-browser: Insufficient validation of untrusted input in Internals

https://bugzilla.redhat.com/show_bug.cgi?id=2114708

[ 21 ] Bug #2114709 - CVE-2022-2619 chromium-browser: Insufficient validation of untrusted input in Settings

https://bugzilla.redhat.com/show_bug.cgi?id=2114709

[ 22 ] Bug #2114710 - CVE-2022-2620 chromium-browser: Use after free in WebUI

https://bugzilla.redhat.com/show_bug.cgi?id=2114710

[ 23 ] Bug #2114711 - CVE-2022-2621 chromium-browser: Use after free in Extensions

https://bugzilla.redhat.com/show_bug.cgi?id=2114711

[ 24 ] Bug #2114712 - CVE-2022-2622 chromium-browser: Insufficient validation of untrusted input in Safe Browsing

https://bugzilla.redhat.com/show_bug.cgi?id=2114712

[ 25 ] Bug #2114713 - CVE-2022-2623 chromium-browser: Use after free in Offline

https://bugzilla.redhat.com/show_bug.cgi?id=2114713

[ 26 ] Bug #2114714 - CVE-2022-2624 chromium-browser: Heap buffer overflow in PDF

https://bugzilla.redhat.com/show_bug.cgi?id=2114714

[ 27 ] Bug #2118934 - CVE-2022-2852 chromium-browser: Use after free in FedCM

https://bugzilla.redhat.com/show_bug.cgi?id=2118934

[ 28 ] Bug #2118935 - CVE-2022-2854 chromium-browser: Use after free in SwiftShader

https://bugzilla.redhat.com/show_bug.cgi?id=2118935

[ 29 ] Bug #2118936 - CVE-2022-2855 chromium-browser: Use after free in ANGLE

https://bugzilla.redhat.com/show_bug.cgi?id=2118936

[ 30 ] Bug #2118937 - CVE-2022-2857 chromium-browser: Use after free in Blink

https://bugzilla.redhat.com/show_bug.cgi?id=2118937

[ 31 ] Bug #2118938 - CVE-2022-2858 chromium-browser: Use after free in Sign-In Flow

https://bugzilla.redhat.com/show_bug.cgi?id=2118938

[ 32 ] Bug #2118939 - CVE-2022-2853 chromium-browser: Heap buffer overflow in Downloads

https://bugzilla.redhat.com/show_bug.cgi?id=2118939

[ 33 ] Bug #2118941 - CVE-2022-2856 chromium-browser: Insufficient validation of untrusted input in Intents

https://bugzilla.redhat.com/show_bug.cgi?id=2118941

[ 34 ] Bug #2118942 - CVE-2022-2859 chromium-browser: Use after free in Chrome OS Shell

https://bugzilla.redhat.com/show_bug.cgi?id=2118942

[ 35 ] Bug #2118943 - CVE-2022-2860 chromium-browser: Insufficient policy enforcement in Cookies

https://bugzilla.redhat.com/show_bug.cgi?id=2118943

[ 36 ] Bug #2118944 - CVE-2022-2861 chromium-browser: Inappropriate implementation in Extensions API

https://bugzilla.redhat.com/show_bug.cgi?id=2118944

[ 37 ] Bug #2123660 - CVE-2022-3038 chromium-browser: Use after free in Network Service

https://bugzilla.redhat.com/show_bug.cgi?id=2123660

[ 38 ] Bug #2123661 - CVE-2022-3039 chromium-browser: Use after free in WebSQL

https://bugzilla.redhat.com/show_bug.cgi?id=2123661

[ 39 ] Bug #2123662 - CVE-2022-3040 chromium-browser: Use after free in Layout

https://bugzilla.redhat.com/show_bug.cgi?id=2123662

[ 40 ] Bug #2123664 - CVE-2022-3041 chromium-browser: Use after free in WebSQL

https://bugzilla.redhat.com/show_bug.cgi?id=2123664

[ 41 ] Bug #2123665 - CVE-2022-3042 chromium-browser: Use after free in PhoneHub

https://bugzilla.redhat.com/show_bug.cgi?id=2123665

[ 42 ] Bug #2123666 - CVE-2022-3043 chromium-browser: Heap buffer overflow in Screen Capture

https://bugzilla.redhat.com/show_bug.cgi?id=2123666

[ 43 ] Bug #2123667 - CVE-2022-3044 chromium-browser: Inappropriate implementation in Site Isolation

https://bugzilla.redhat.com/show_bug.cgi?id=2123667

[ 44 ] Bug #2123668 - CVE-2022-3045 chromium-browser: Insufficient validation of untrusted input in V8

https://bugzilla.redhat.com/show_bug.cgi?id=2123668

[ 45 ] Bug #2123669 - CVE-2022-3046 chromium-browser: Use after free in Browser Tag

https://bugzilla.redhat.com/show_bug.cgi?id=2123669

[ 46 ] Bug #2123670 - CVE-2022-3071 chromium-browser: Use after free in Tab Strip

https://bugzilla.redhat.com/show_bug.cgi?id=2123670

[ 47 ] Bug #2123671 - CVE-2022-3047 chromium-browser: Insufficient policy enforcement in Extensions API

https://bugzilla.redhat.com/show_bug.cgi?id=2123671

[ 48 ] Bug #2123672 - CVE-2022-3048 chromium-browser: Inappropriate implementation in Chrome OS lockscreen

https://bugzilla.redhat.com/show_bug.cgi?id=2123672

[ 49 ] Bug #2123673 - CVE-2022-3049 chromium-browser: Use after free in SplitScreen

https://bugzilla.redhat.com/show_bug.cgi?id=2123673

[ 50 ] Bug #2123674 - CVE-2022-3050 chromium-browser: Heap buffer overflow in WebUI

https://bugzilla.redhat.com/show_bug.cgi?id=2123674

[ 51 ] Bug #2123675 - CVE-2022-3051 chromium-browser: Heap buffer overflow in Exosphere

https://bugzilla.redhat.com/show_bug.cgi?id=2123675

[ 52 ] Bug #2123676 - CVE-2022-3052 chromium-browser: Heap buffer overflow in Window Manager

https://bugzilla.redhat.com/show_bug.cgi?id=2123676

[ 53 ] Bug #2123677 - CVE-2022-3053 chromium-browser: Inappropriate implementation in Pointer Lock

https://bugzilla.redhat.com/show_bug.cgi?id=2123677

[ 54 ] Bug #2123678 - CVE-2022-3054 chromium-browser: Insufficient policy enforcement in DevTools

https://bugzilla.redhat.com/show_bug.cgi?id=2123678

[ 55 ] Bug #2123679 - CVE-2022-3055 chromium-browser: Use after free in Passwords

https://bugzilla.redhat.com/show_bug.cgi?id=2123679

[ 56 ] Bug #2123680 - CVE-2022-3056 chromium-browser: Insufficient policy enforcement in Content Security Policy

https://bugzilla.redhat.com/show_bug.cgi?id=2123680

[ 57 ] Bug #2123681 - CVE-2022-3057 chromium-browser: Inappropriate implementation in iframe Sandbox

https://bugzilla.redhat.com/show_bug.cgi?id=2123681

[ 58 ] Bug #2123683 - CVE-2022-3058 chromium-browser: Use after free in Sign-In Flow

https://bugzilla.redhat.com/show_bug.cgi?id=2123683

[ 59 ] Bug #2124154 - CVE-2022-3075 chromium-browser: Insufficient data validation in Mojo

https://bugzilla.redhat.com/show_bug.cgi?id=2124154

[ 60 ] Bug #2126918 - CVE-2022-3195 chromium-browser: Out of bounds write in Storage

https://bugzilla.redhat.com/show_bug.cgi?id=2126918

[ 61 ] Bug #2126919 - CVE-2022-3196 chromium-browser: Use after free in PDF

https://bugzilla.redhat.com/show_bug.cgi?id=2126919

[ 62 ] Bug #2126920 - CVE-2022-3197 chromium-browser: Use after free in PDF

https://bugzilla.redhat.com/show_bug.cgi?id=2126920

[ 63 ] Bug #2126921 - CVE-2022-3198 chromium-browser: Use after free in PDF

https://bugzilla.redhat.com/show_bug.cgi?id=2126921

[ 64 ] Bug #2126922 - CVE-2022-3199 chromium-browser: Use after free in Frames

https://bugzilla.redhat.com/show_bug.cgi?id=2126922

[ 65 ] Bug #2126923 - CVE-2022-3200 chromium-browser: Heap buffer overflow in Internals

https://bugzilla.redhat.com/show_bug.cgi?id=2126923

[ 66 ] Bug #2126924 - CVE-2022-3201 chromium-browser: Insufficient validation of untrusted input in DevTools

https://bugzilla.redhat.com/show_bug.cgi?id=2126924

su -c 'dnf upgrade --advisory FEDORA-2022-b49c9bc07a' at the command

line. For more information, refer to the dnf documentation available at

https://dnf.readthedocs.io/en/latest/command_ref.html

All packages are signed with the Fedora Project GPG key. More details on the

GPG keys used by the Fedora Project can be found at

https://fedoraproject.org/keys

package-announce mailing list -- package-announce@lists.fedoraproject.org

To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org

Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/

List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines

List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org

Do not reply to spam, report it: https://pagure.io/login/

FEDORA-2022-b49c9bc07a 2022-10-05 01:00:11.180903 Product : Fedora 36 Version : 105.0.5195.125 Release : 2.fc36 URL : https://www.chromium.org/Home/ Summary : A WebKit (Blink) powered web browser that Google doesn't want you to use Description : Chromium is an open-source web browser, powered by WebKit (Blink). Update to chromium-105.0.5195.125. This package only has minor changes... ah, just kidding. Here is the pile of security issues it fixes: CVE-2022-2007 CVE-2022-2008 CVE-2022-2010 CVE-2022-2011 CVE-2022-2603 CVE-2022-2604 CVE-2022-2605 CVE-2022-2606 CVE-2022-2607 CVE-2022-2608 CVE-2022-2609 CVE-2022-2610 CVE-2022-2611 CVE-2022-2612 CVE-2022-2613 CVE-2022-2614 CVE-2022-2615 CVE-2022-2616 CVE-2022-2617 CVE-2022-2618 CVE-2022-2619 CVE-2022-2620 CVE-2022-2621 CVE-2022-2622 CVE-2022-2623 CVE-2022-2624 CVE-2022-2852 CVE-2022-2854 CVE-2022-2855 CVE-2022-2857 CVE-2022-2858 CVE-2022-2853 CVE-2022-2856 CVE-2022-2859 CVE-2022-2860 CVE-2022-2861 CVE-2022-3038 CVE-2022-3039 CVE-2022-3040 CVE-2022-3041 CVE-2022-3042 CVE-2022-3043 CVE-2022-3044 CVE-2022-3045 CVE-2022-3046 CVE-2022-3071 CVE-2022-3047 CVE-2022-3048 CVE-2022-3049 CVE-2022-3050 CVE-2022-3051 CVE-2022-3052 CVE-2022-3053 CVE-2022-3054 CVE-2022-3055 CVE-2022-3056 CVE-2022-3057 CVE-2022-3058 CVE-2022-3075 CVE-2022-3195 CVE-2022-3196 CVE-2022-3197 CVE-2022-3198 CVE-2022-3199 CVE-2022-3200 CVE-2022-3201 * Fri Sep 23 2022 Tom Callaway - 105.0.5195.125-2 - apply upstream fix for wayland menu misplacement bug * Mon Sep 19 2022 Tom Callaway - 105.0.5195.125-1 - update to 105.0.5195.125 * Thu Sep 1 2022 Tom Callaway - 105.0.5195.52-1 - update to 105.0.5195.52 * Thu Aug 18 2022 Tom Callaway - 104.0.5112.101-1 - update to 104.0.5112.101 * Wed Jul 20 2022 Fedora Release Engineering - 103.0.5060.114-2 - Rebuilt for https://fedoraproject.org/wiki/Fedora_37_Mass_Rebuild [ 1 ] Bug #2095757 - CVE-2022-2007 chromium-browser: Use after free in WebGPU https://bugzilla.redhat.com/show_bug.cgi?id=2095757 [ 2 ] Bug #2095759 - CVE-2022-2008 chromium-browser: Out of bounds memory access in WebGL https://bugzilla.redhat.com/show_bug.cgi?id=2095759 [ 3 ] Bug #2095760 - CVE-2022-2010 chromium-browser: Out of bounds read in compositing https://bugzilla.redhat.com/show_bug.cgi?id=2095760 [ 4 ] Bug #2095761 - CVE-2022-2011 chromium-browser: Use after free in ANGLE https://bugzilla.redhat.com/show_bug.cgi?id=2095761 [ 5 ] Bug #2114693 - CVE-2022-2603 chromium-browser: Use after free in Omnibox https://bugzilla.redhat.com/show_bug.cgi?id=2114693 [ 6 ] Bug #2114694 - CVE-2022-2604 chromium-browser: Use after free in Safe Browsing https://bugzilla.redhat.com/show_bug.cgi?id=2114694 [ 7 ] Bug #2114695 - CVE-2022-2605 chromium-browser: Out of bounds read in Dawn https://bugzilla.redhat.com/show_bug.cgi?id=2114695 [ 8 ] Bug #2114696 - CVE-2022-2606 chromium-browser: Use after free in Managed devices API https://bugzilla.redhat.com/show_bug.cgi?id=2114696 [ 9 ] Bug #2114697 - CVE-2022-2607 chromium-browser: Use after free in Tab Strip https://bugzilla.redhat.com/show_bug.cgi?id=2114697 [ 10 ] Bug #2114698 - CVE-2022-2608 chromium-browser: Use after free in Overview Mode https://bugzilla.redhat.com/show_bug.cgi?id=2114698 [ 11 ] Bug #2114699 - CVE-2022-2609 chromium-browser: Use after free in Nearby Share https://bugzilla.redhat.com/show_bug.cgi?id=2114699 [ 12 ] Bug #2114700 - CVE-2022-2610 chromium-browser: Insufficient policy enforcement in Background Fetch https://bugzilla.redhat.com/show_bug.cgi?id=2114700 [ 13 ] Bug #2114701 - CVE-2022-2611 chromium-browser: Inappropriate implementation in Fullscreen API https://bugzilla.redhat.com/show_bug.cgi?id=2114701 [ 14 ] Bug #2114702 - CVE-2022-2612 chromium-browser: Side-channel information leakage in Keyboard input https://bugzilla.redhat.com/show_bug.cgi?id=2114702 [ 15 ] Bug #2114703 - CVE-2022-2613 chromium-browser: Use after free in Input https://bugzilla.redhat.com/show_bug.cgi?id=2114703 [ 16 ] Bug #2114704 - CVE-2022-2614 chromium-browser: Use after free in Sign-In Flow https://bugzilla.redhat.com/show_bug.cgi?id=2114704 [ 17 ] Bug #2114705 - CVE-2022-2615 chromium-browser: Insufficient policy enforcement in Cookies https://bugzilla.redhat.com/show_bug.cgi?id=2114705 [ 18 ] Bug #2114706 - CVE-2022-2616 chromium-browser: Inappropriate implementation in Extensions API https://bugzilla.redhat.com/show_bug.cgi?id=2114706 [ 19 ] Bug #2114707 - CVE-2022-2617 chromium-browser: Use after free in Extensions API https://bugzilla.redhat.com/show_bug.cgi?id=2114707 [ 20 ] Bug #2114708 - CVE-2022-2618 chromium-browser: Insufficient validation of untrusted input in Internals https://bugzilla.redhat.com/show_bug.cgi?id=2114708 [ 21 ] Bug #2114709 - CVE-2022-2619 chromium-browser: Insufficient validation of untrusted input in Settings https://bugzilla.redhat.com/show_bug.cgi?id=2114709 [ 22 ] Bug #2114710 - CVE-2022-2620 chromium-browser: Use after free in WebUI https://bugzilla.redhat.com/show_bug.cgi?id=2114710 [ 23 ] Bug #2114711 - CVE-2022-2621 chromium-browser: Use after free in Extensions https://bugzilla.redhat.com/show_bug.cgi?id=2114711 [ 24 ] Bug #2114712 - CVE-2022-2622 chromium-browser: Insufficient validation of untrusted input in Safe Browsing https://bugzilla.redhat.com/show_bug.cgi?id=2114712 [ 25 ] Bug #2114713 - CVE-2022-2623 chromium-browser: Use after free in Offline https://bugzilla.redhat.com/show_bug.cgi?id=2114713 [ 26 ] Bug #2114714 - CVE-2022-2624 chromium-browser: Heap buffer overflow in PDF https://bugzilla.redhat.com/show_bug.cgi?id=2114714 [ 27 ] Bug #2118934 - CVE-2022-2852 chromium-browser: Use after free in FedCM https://bugzilla.redhat.com/show_bug.cgi?id=2118934 [ 28 ] Bug #2118935 - CVE-2022-2854 chromium-browser: Use after free in SwiftShader https://bugzilla.redhat.com/show_bug.cgi?id=2118935 [ 29 ] Bug #2118936 - CVE-2022-2855 chromium-browser: Use after free in ANGLE https://bugzilla.redhat.com/show_bug.cgi?id=2118936 [ 30 ] Bug #2118937 - CVE-2022-2857 chromium-browser: Use after free in Blink https://bugzilla.redhat.com/show_bug.cgi?id=2118937 [ 31 ] Bug #2118938 - CVE-2022-2858 chromium-browser: Use after free in Sign-In Flow https://bugzilla.redhat.com/show_bug.cgi?id=2118938 [ 32 ] Bug #2118939 - CVE-2022-2853 chromium-browser: Heap buffer overflow in Downloads https://bugzilla.redhat.com/show_bug.cgi?id=2118939 [ 33 ] Bug #2118941 - CVE-2022-2856 chromium-browser: Insufficient validation of untrusted input in Intents https://bugzilla.redhat.com/show_bug.cgi?id=2118941 [ 34 ] Bug #2118942 - CVE-2022-2859 chromium-browser: Use after free in Chrome OS Shell https://bugzilla.redhat.com/show_bug.cgi?id=2118942 [ 35 ] Bug #2118943 - CVE-2022-2860 chromium-browser: Insufficient policy enforcement in Cookies https://bugzilla.redhat.com/show_bug.cgi?id=2118943 [ 36 ] Bug #2118944 - CVE-2022-2861 chromium-browser: Inappropriate implementation in Extensions API https://bugzilla.redhat.com/show_bug.cgi?id=2118944 [ 37 ] Bug #2123660 - CVE-2022-3038 chromium-browser: Use after free in Network Service https://bugzilla.redhat.com/show_bug.cgi?id=2123660 [ 38 ] Bug #2123661 - CVE-2022-3039 chromium-browser: Use after free in WebSQL https://bugzilla.redhat.com/show_bug.cgi?id=2123661 [ 39 ] Bug #2123662 - CVE-2022-3040 chromium-browser: Use after free in Layout https://bugzilla.redhat.com/show_bug.cgi?id=2123662 [ 40 ] Bug #2123664 - CVE-2022-3041 chromium-browser: Use after free in WebSQL https://bugzilla.redhat.com/show_bug.cgi?id=2123664 [ 41 ] Bug #2123665 - CVE-2022-3042 chromium-browser: Use after free in PhoneHub https://bugzilla.redhat.com/show_bug.cgi?id=2123665 [ 42 ] Bug #2123666 - CVE-2022-3043 chromium-browser: Heap buffer overflow in Screen Capture https://bugzilla.redhat.com/show_bug.cgi?id=2123666 [ 43 ] Bug #2123667 - CVE-2022-3044 chromium-browser: Inappropriate implementation in Site Isolation https://bugzilla.redhat.com/show_bug.cgi?id=2123667 [ 44 ] Bug #2123668 - CVE-2022-3045 chromium-browser: Insufficient validation of untrusted input in V8 https://bugzilla.redhat.com/show_bug.cgi?id=2123668 [ 45 ] Bug #2123669 - CVE-2022-3046 chromium-browser: Use after free in Browser Tag https://bugzilla.redhat.com/show_bug.cgi?id=2123669 [ 46 ] Bug #2123670 - CVE-2022-3071 chromium-browser: Use after free in Tab Strip https://bugzilla.redhat.com/show_bug.cgi?id=2123670 [ 47 ] Bug #2123671 - CVE-2022-3047 chromium-browser: Insufficient policy enforcement in Extensions API https://bugzilla.redhat.com/show_bug.cgi?id=2123671 [ 48 ] Bug #2123672 - CVE-2022-3048 chromium-browser: Inappropriate implementation in Chrome OS lockscreen https://bugzilla.redhat.com/show_bug.cgi?id=2123672 [ 49 ] Bug #2123673 - CVE-2022-3049 chromium-browser: Use after free in SplitScreen https://bugzilla.redhat.com/show_bug.cgi?id=2123673 [ 50 ] Bug #2123674 - CVE-2022-3050 chromium-browser: Heap buffer overflow in WebUI https://bugzilla.redhat.com/show_bug.cgi?id=2123674 [ 51 ] Bug #2123675 - CVE-2022-3051 chromium-browser: Heap buffer overflow in Exosphere https://bugzilla.redhat.com/show_bug.cgi?id=2123675 [ 52 ] Bug #2123676 - CVE-2022-3052 chromium-browser: Heap buffer overflow in Window Manager https://bugzilla.redhat.com/show_bug.cgi?id=2123676 [ 53 ] Bug #2123677 - CVE-2022-3053 chromium-browser: Inappropriate implementation in Pointer Lock https://bugzilla.redhat.com/show_bug.cgi?id=2123677 [ 54 ] Bug #2123678 - CVE-2022-3054 chromium-browser: Insufficient policy enforcement in DevTools https://bugzilla.redhat.com/show_bug.cgi?id=2123678 [ 55 ] Bug #2123679 - CVE-2022-3055 chromium-browser: Use after free in Passwords https://bugzilla.redhat.com/show_bug.cgi?id=2123679 [ 56 ] Bug #2123680 - CVE-2022-3056 chromium-browser: Insufficient policy enforcement in Content Security Policy https://bugzilla.redhat.com/show_bug.cgi?id=2123680 [ 57 ] Bug #2123681 - CVE-2022-3057 chromium-browser: Inappropriate implementation in iframe Sandbox https://bugzilla.redhat.com/show_bug.cgi?id=2123681 [ 58 ] Bug #2123683 - CVE-2022-3058 chromium-browser: Use after free in Sign-In Flow https://bugzilla.redhat.com/show_bug.cgi?id=2123683 [ 59 ] Bug #2124154 - CVE-2022-3075 chromium-browser: Insufficient data validation in Mojo https://bugzilla.redhat.com/show_bug.cgi?id=2124154 [ 60 ] Bug #2126918 - CVE-2022-3195 chromium-browser: Out of bounds write in Storage https://bugzilla.redhat.com/show_bug.cgi?id=2126918 [ 61 ] Bug #2126919 - CVE-2022-3196 chromium-browser: Use after free in PDF https://bugzilla.redhat.com/show_bug.cgi?id=2126919 [ 62 ] Bug #2126920 - CVE-2022-3197 chromium-browser: Use after free in PDF https://bugzilla.redhat.com/show_bug.cgi?id=2126920 [ 63 ] Bug #2126921 - CVE-2022-3198 chromium-browser: Use after free in PDF https://bugzilla.redhat.com/show_bug.cgi?id=2126921 [ 64 ] Bug #2126922 - CVE-2022-3199 chromium-browser: Use after free in Frames https://bugzilla.redhat.com/show_bug.cgi?id=2126922 [ 65 ] Bug #2126923 - CVE-2022-3200 chromium-browser: Heap buffer overflow in Internals https://bugzilla.redhat.com/show_bug.cgi?id=2126923 [ 66 ] Bug #2126924 - CVE-2022-3201 chromium-browser: Insufficient validation of untrusted input in DevTools https://bugzilla.redhat.com/show_bug.cgi?id=2126924 su -c 'dnf upgrade --advisory FEDORA-2022-b49c9bc07a' at the command line. For more information, refer to the dnf documentation available at https://dnf.readthedocs.io/en/latest/command_ref.html All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org Do not reply to spam, report it: https://pagure.io/login/

Change Log

References

Update Instructions

Severity
Product : Fedora 36
Version : 105.0.5195.125
Release : 2.fc36
URL : https://www.chromium.org/Home/
Summary : A WebKit (Blink) powered web browser that Google doesn't want you to use

Related News