Fedora 26: chromium Security Update 2017-efeb59171d
Summary
Chromium is an open-source web browser, powered by WebKit (Blink).
Update to 61.0.3163.100. Security fix for CVE-2017-5111, CVE-2017-5112,
CVE-2017-5113, CVE-2017-5114, CVE-2017-5115, CVE-2017-5116, CVE-2017-5117,
CVE-2017-5118, CVE-2017-5119, CVE-2017-5120, CVE-2017-5121, CVE-2017-5122
[ 1 ] Bug #1488782 - CVE-2017-5120 chromium-browser: potential https downgrade during redirect navigation
https://bugzilla.redhat.com/show_bug.cgi?id=1488782
[ 2 ] Bug #1488781 - CVE-2017-5119 chromium-browser: use of uninitialized value in skia
https://bugzilla.redhat.com/show_bug.cgi?id=1488781
[ 3 ] Bug #1488779 - CVE-2017-5118 chromium-browser: bypass of content security policy in blink
https://bugzilla.redhat.com/show_bug.cgi?id=1488779
[ 4 ] Bug #1488778 - CVE-2017-5117 chromium-browser: use of uninitialized value in skia
https://bugzilla.redhat.com/show_bug.cgi?id=1488778
[ 5 ] Bug #1488777 - CVE-2017-5116 chromium-browser: type confusion in v8
https://bugzilla.redhat.com/show_bug.cgi?id=1488777
[ 6 ] Bug #1488776 - CVE-2017-5115 chromium-browser: type confusion in v8
https://bugzilla.redhat.com/show_bug.cgi?id=1488776
[ 7 ] Bug #1488775 - CVE-2017-5114 chromium-browser: memory lifecycle issue in pdfium
https://bugzilla.redhat.com/show_bug.cgi?id=1488775
[ 8 ] Bug #1488774 - CVE-2017-5113 chromium-browser: heap buffer overflow in skia
https://bugzilla.redhat.com/show_bug.cgi?id=1488774
[ 9 ] Bug #1488773 - CVE-2017-5112 chromium-browser: heap buffer overflow in webgl
https://bugzilla.redhat.com/show_bug.cgi?id=1488773
[ 10 ] Bug #1488772 - CVE-2017-5111 chromium-browser: use after free in pdfium
https://bugzilla.redhat.com/show_bug.cgi?id=1488772
[ 11 ] Bug #1494392 - CVE-2017-5122 chromium-browser: out-of-bounds access in v8
https://bugzilla.redhat.com/show_bug.cgi?id=1494392
[ 12 ] Bug #1494391 - CVE-2017-5121 chromium-browser: out-of-bounds access in v8
https://bugzilla.redhat.com/show_bug.cgi?id=1494391
su -c 'dnf upgrade chromium' at the command line.
For more information, refer to the dnf documentation available at
https://dnf.readthedocs.io/en/latest/command_ref.html
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/security/
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Change Log
References