The following Fedora EPEL 7 Security updates need testing:
 Age  URL
   5  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2024-c2135dc540   
3proxy-0.9.4-2.el7


The following builds have been pushed to Fedora EPEL 7 updates-testing

    chromium-122.0.6261.69-1.el7

Details about builds:


================================================================================
 chromium-122.0.6261.69-1.el7 (FEDORA-EPEL-2024-5ef433f7ed)
 A WebKit (Blink) powered web browser that Google doesn't want you to use
--------------------------------------------------------------------------------
Update Information:

Update to 122.0.6261.69
--------------------------------------------------------------------------------
ChangeLog:

* Fri Feb 23 2024 Than Ngo <t...@redhat.com> - 122.0.6261.69-1
- update to 122.0.6261.69
- fix build error on el8
- bz#2265039, built with -fwrapv for improved memory safety
- bz#2265043, built with -ftrivial-auto-var-init=zero for improved security and 
preditability
* Wed Feb 21 2024 Than Ngo <t...@redhat.com> - 122.0.6261.57-1
- update to 122.0.6261.57
   * High CVE-2024-1669: Out of bounds memory access in Blink
   * High CVE-2024-1670: Use after free in Mojo
   * Medium CVE-2024-1671: Inappropriate implementation in Site Isolation
   * Medium CVE-2024-1672: Inappropriate implementation in Content Security 
Policy
   * Medium CVE-2024-1673: Use after free in Accessibility
   * Medium CVE-2024-1674: Inappropriate implementation in Navigation
   * Medium CVE-2024-1675: Insufficient policy enforcement in Download
   * Low CVE-2024-1676: Inappropriate implementation in Navigation.
* Sun Feb 18 2024 Than Ngo <t...@redhat.com> - 122.0.6261.39-1
- update to 122.0.6261.39
* Wed Feb 14 2024 Than Ngo <t...@redhat.com> - 121.0.6167.184-1
- update to 121.0.6167.184
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #2265256 - CVE-2024-1669 CVE-2024-1670 CVE-2024-1671 CVE-2024-1672 
CVE-2024-1673 CVE-2024-1674 CVE-2024-1675 CVE-2024-1676 chromium: various flaws 
[epel-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=2265256
--------------------------------------------------------------------------------

--
_______________________________________________
epel-devel mailing list -- epel-devel@lists.fedoraproject.org
To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/epel-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue

Reply via email to