The following Fedora EPEL 8 Security updates need testing:
Age URL
5 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2022-8d638fabd8
restic-0.13.1-1.el8
The following builds have been pushed to Fedora EPEL 8 updates-testing
chromium-102.0.5005.115-1.el8
glances-3.2.5-1.el8
packit-0.53.0-1.el8
resalloc-aws-1.3-1.el8
scitokens-cpp-0.7.1-1.el8
tio-1.40-1.el8
Details about builds:
================================================================================
chromium-102.0.5005.115-1.el8 (FEDORA-EPEL-2022-3a6675bd1a)
A WebKit (Blink) powered web browser that Google doesn't want you to use
--------------------------------------------------------------------------------
Update Information:
Update to Chromium 102.0.5005.115 (yes, I know there is a newer one, but we need
to get something out now). This also adds the first build of Chromium for
EPEL9, many thanks to all the folks who got the many dependencies built. Fixes:
CVE-2022-1232 CVE-2022-1364 CVE-2022-1633 CVE-2022-1634 CVE-2022-1635
CVE-2022-1636 CVE-2022-1637 CVE-2022-1638 CVE-2022-1639 CVE-2022-1640
CVE-2022-1641 CVE-2022-1853 CVE-2022-1854 CVE-2022-1855 CVE-2022-1856
CVE-2022-1857 CVE-2022-1858 CVE-2022-1859 CVE-2022-1860 CVE-2022-1861
CVE-2022-1862 CVE-2022-1863 CVE-2022-1864 CVE-2022-1865 CVE-2022-1866
CVE-2022-1867 CVE-2022-1868 CVE-2022-1869 CVE-2022-1870 CVE-2022-1871
CVE-2022-1872 CVE-2022-1873 CVE-2022-1874 CVE-2022-1875 CVE-2022-1876
--------------------------------------------------------------------------------
ChangeLog:
* Fri Jun 10 2022 Tom Callaway <[email protected]> - 102.0.5005.115-1
- update to 102.0.5005.115
* Fri Jun 3 2022 Tom Callaway <[email protected]> - 102.0.5005.61-1
- update to 102.0.5005.61
* Wed Apr 27 2022 Tom Callaway <[email protected]> - 101.0.4951.41-1
- update to 101.0.4951.41
* Thu Apr 21 2022 Tom Callaway <[email protected]> - 100.0.4896.127-1
- update to 100.0.4896.127
* Tue Apr 5 2022 Tom Callaway <[email protected]> - 100.0.4896.75-1
- update to 100.0.4896.75
* Sat Apr 2 2022 Tom Callaway <[email protected]> - 100.0.4896.60-1
- update to 100.0.4896.60
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #2071876 - CVE-2022-1232 chromium-browser: Type Confusion in V8
https://bugzilla.redhat.com/show_bug.cgi?id=2071876
[ 2 ] Bug #2076274 - CVE-2022-1364 Chromium-browser: Type Confusion in V8.
https://bugzilla.redhat.com/show_bug.cgi?id=2076274
[ 3 ] Bug #2084016 - CVE-2022-1633 chromium-browser: Use after free in
Sharesheet
https://bugzilla.redhat.com/show_bug.cgi?id=2084016
[ 4 ] Bug #2084017 - CVE-2022-1634 chromium-browser: Use after free in
Browser UI
https://bugzilla.redhat.com/show_bug.cgi?id=2084017
[ 5 ] Bug #2084018 - CVE-2022-1635 chromium-browser: Use after free in
Permission Prompts
https://bugzilla.redhat.com/show_bug.cgi?id=2084018
[ 6 ] Bug #2084019 - CVE-2022-1636 chromium-browser: Use after free in
Performance APIs
https://bugzilla.redhat.com/show_bug.cgi?id=2084019
[ 7 ] Bug #2084020 - CVE-2022-1637 chromium-browser: Inappropriate
implementation in Web Contents
https://bugzilla.redhat.com/show_bug.cgi?id=2084020
[ 8 ] Bug #2084021 - CVE-2022-1638 chromium-browser: Heap buffer overflow in
V8 Internationalization
https://bugzilla.redhat.com/show_bug.cgi?id=2084021
[ 9 ] Bug #2084022 - CVE-2022-1639 chromium-browser: Use after free in ANGLE
https://bugzilla.redhat.com/show_bug.cgi?id=2084022
[ 10 ] Bug #2084023 - CVE-2022-1640 chromium-browser: Use after free in
Sharing
https://bugzilla.redhat.com/show_bug.cgi?id=2084023
[ 11 ] Bug #2084024 - CVE-2022-1641 chromium-browser: Use after free in Web
UI Diagnostics
https://bugzilla.redhat.com/show_bug.cgi?id=2084024
[ 12 ] Bug #2090284 - CVE-2022-1853 chromium-browser: Use after free in
Indexed DB
https://bugzilla.redhat.com/show_bug.cgi?id=2090284
[ 13 ] Bug #2090285 - CVE-2022-1854 chromium-browser: Use after free in ANGLE
https://bugzilla.redhat.com/show_bug.cgi?id=2090285
[ 14 ] Bug #2090286 - CVE-2022-1855 chromium-browser: Use after free in
Messaging
https://bugzilla.redhat.com/show_bug.cgi?id=2090286
[ 15 ] Bug #2090287 - CVE-2022-1856 chromium-browser: Use after free in User
Education
https://bugzilla.redhat.com/show_bug.cgi?id=2090287
[ 16 ] Bug #2090288 - CVE-2022-1857 chromium-browser: Insufficient policy
enforcement in File System API
https://bugzilla.redhat.com/show_bug.cgi?id=2090288
[ 17 ] Bug #2090289 - CVE-2022-1858 chromium-browser: Out of bounds read in
DevTools
https://bugzilla.redhat.com/show_bug.cgi?id=2090289
[ 18 ] Bug #2090290 - CVE-2022-1859 chromium-browser: Use after free in
Performance Manager
https://bugzilla.redhat.com/show_bug.cgi?id=2090290
[ 19 ] Bug #2090291 - CVE-2022-1860 chromium-browser: Use after free in UI
Foundations
https://bugzilla.redhat.com/show_bug.cgi?id=2090291
[ 20 ] Bug #2090292 - CVE-2022-1861 chromium-browser: Use after free in
Sharing
https://bugzilla.redhat.com/show_bug.cgi?id=2090292
[ 21 ] Bug #2090293 - CVE-2022-1862 chromium-browser: Inappropriate
implementation in Extensions
https://bugzilla.redhat.com/show_bug.cgi?id=2090293
[ 22 ] Bug #2090294 - CVE-2022-1863 chromium-browser: Use after free in Tab
Groups
https://bugzilla.redhat.com/show_bug.cgi?id=2090294
[ 23 ] Bug #2090295 - CVE-2022-1864 chromium-browser: Use after free in
WebApp Installs
https://bugzilla.redhat.com/show_bug.cgi?id=2090295
[ 24 ] Bug #2090296 - CVE-2022-1865 chromium-browser: Use after free in
Bookmarks
https://bugzilla.redhat.com/show_bug.cgi?id=2090296
[ 25 ] Bug #2090297 - CVE-2022-1866 chromium-browser: Use after free in
Tablet Mode
https://bugzilla.redhat.com/show_bug.cgi?id=2090297
[ 26 ] Bug #2090298 - CVE-2022-1867 chromium-browser: Insufficient validation
of untrusted input in Data Transfer
https://bugzilla.redhat.com/show_bug.cgi?id=2090298
[ 27 ] Bug #2090299 - CVE-2022-1868 chromium-browser: Inappropriate
implementation in Extensions API
https://bugzilla.redhat.com/show_bug.cgi?id=2090299
[ 28 ] Bug #2090300 - CVE-2022-1869 chromium-browser: Type Confusion in V8
https://bugzilla.redhat.com/show_bug.cgi?id=2090300
[ 29 ] Bug #2090303 - CVE-2022-1870 chromium-browser: Use after free in App
Service
https://bugzilla.redhat.com/show_bug.cgi?id=2090303
[ 30 ] Bug #2090304 - CVE-2022-1871 chromium-browser: Insufficient policy
enforcement in File System API
https://bugzilla.redhat.com/show_bug.cgi?id=2090304
[ 31 ] Bug #2090305 - CVE-2022-1872 chromium-browser: Insufficient policy
enforcement in Extensions API
https://bugzilla.redhat.com/show_bug.cgi?id=2090305
[ 32 ] Bug #2090306 - CVE-2022-1873 chromium-browser: Insufficient policy
enforcement in COOP
https://bugzilla.redhat.com/show_bug.cgi?id=2090306
[ 33 ] Bug #2090307 - CVE-2022-1874 chromium-browser: Insufficient policy
enforcement in Safe Browsing
https://bugzilla.redhat.com/show_bug.cgi?id=2090307
[ 34 ] Bug #2090308 - CVE-2022-1875 chromium-browser: Inappropriate
implementation in PDF
https://bugzilla.redhat.com/show_bug.cgi?id=2090308
[ 35 ] Bug #2090309 - CVE-2022-1876 chromium-browser: Heap buffer overflow in
DevTools
https://bugzilla.redhat.com/show_bug.cgi?id=2090309
--------------------------------------------------------------------------------
================================================================================
glances-3.2.5-1.el8 (FEDORA-EPEL-2022-59cdfb46c4)
A cross-platform curses-based monitoring tool
--------------------------------------------------------------------------------
Update Information:
Security fix for CVE-2021-23418
--------------------------------------------------------------------------------
ChangeLog:
* Wed Jun 22 2022 Ali Erdinc Koroglu <[email protected]> - 3.2.5-1
- Update to 3.2.5 (rhbz #1963987 and #1988545)
* Thu Jan 20 2022 Fedora Release Engineering <[email protected]> -
3.1.4.1-12
- Rebuilt for https://fedoraproject.org/wiki/Fedora_36_Mass_Rebuild
* Thu Jul 22 2021 Fedora Release Engineering <[email protected]> -
3.1.4.1-11
- Rebuilt for https://fedoraproject.org/wiki/Fedora_35_Mass_Rebuild
* Fri Jun 4 2021 Python Maint <[email protected]> - 3.1.4.1-10
- Rebuilt for Python 3.10
* Tue Jan 26 2021 Fedora Release Engineering <[email protected]> -
3.1.4.1-9
- Rebuilt for https://fedoraproject.org/wiki/Fedora_34_Mass_Rebuild
* Mon Jul 27 2020 Fedora Release Engineering <[email protected]> -
3.1.4.1-8
- Rebuilt for https://fedoraproject.org/wiki/Fedora_33_Mass_Rebuild
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #1963987 - glances: Unsafe XML parsing [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1963987
[ 2 ] Bug #1988545 - CVE-2021-23418 glances: XEE injection via the use of
Fault to parse untrusted XML data [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1988545
--------------------------------------------------------------------------------
================================================================================
packit-0.53.0-1.el8 (FEDORA-EPEL-2022-546f3ae714)
A tool for integrating upstream projects with Fedora operating system
--------------------------------------------------------------------------------
Update Information:
New upstream release: 0.53.0
--------------------------------------------------------------------------------
ChangeLog:
* Wed Jun 22 2022 Packit <[email protected]> - 0.53.0-1
- Packit now works with Bodhi 5 and Bodhi 6 authentication mechanism. (#1629)
- Git ref name that Packit works with during `propose-downstream` is now made
more obvious in logs. (#1626)
- Packit now correctly handles creation of custom archives in root while a
specfile is in a subdirectory. (#1622)
- Creation of a Bodhi update will not timeout anymore as Packit is now using a
more efficient way of obtaining the latest build in a release. (#1612)
--------------------------------------------------------------------------------
================================================================================
resalloc-aws-1.3-1.el8 (FEDORA-EPEL-2022-34c999ec63)
Resource allocator scripts for AWS
--------------------------------------------------------------------------------
Update Information:
New script resalloc-aws-list
--------------------------------------------------------------------------------
ChangeLog:
* Wed Jun 22 2022 Pavel Raiskup <[email protected]> 1.3-1
- New script resalloc-aws-list
--------------------------------------------------------------------------------
================================================================================
scitokens-cpp-0.7.1-1.el8 (FEDORA-EPEL-2022-033762bcf7)
C++ Implementation of the SciTokens Library
--------------------------------------------------------------------------------
Update Information:
- Enabling unit tests should not disable install of libraries and binaries -
Warnings as errors option - Convert CMakeLists.txt to "modern" cmake style -
fix apparent fd-leak of sqlite handle
--------------------------------------------------------------------------------
ChangeLog:
* Wed Jun 22 2022 Derek Weitzel <[email protected]> - 0.7.1-1
- Add scitokens-* binaries to the package
- Bug: close sqlite db handle on return
--------------------------------------------------------------------------------
================================================================================
tio-1.40-1.el8 (FEDORA-EPEL-2022-2acb5da6bf)
Simple TTY terminal I/O application
--------------------------------------------------------------------------------
Update Information:
# tio v1.40 * Add config support for log-strip * Add config support for
hex-mode * Rename `--hex` to `--hex-mode` * Fix completion for `-e`,
`--local-echo` * Ignore newlines in hex output * Fix newline in
`warning_printf()` * Fix `ansi_printf_raw()` in no color mode * Enter non-
interactive mode when piping to tio Add support for a non interactive mode
which allows other application to pipe data to tio which then forwards the data
to the connected serial device. Non ineractive means that tio does not
react to interactive key commands in the incoming stream. This allows users to
pipe binary data directly to the connected serial device. Example use: `$
cat commands.txt | tio /dev/ttyUSB0` * Also strip backspace from log To
make log strip feature consistent so that we remove all unprintable control
characters and escape sequences. * Socket code cleanup * Cleanup man page
* Rename `--log-filename` to `--log-file` * Allow strip escape sequence
characters from log file The log without escape key stripped is like: ```
^M[12:47:17] ACRN:\> ^M[12:47:17] ACRN:\>lasdfjklsdjf ^M ^M[12:47:18] Error:
Invalid command. ^M[12:47:19] ACRN:\> ^M[12:47:26] ACRN:\> ^M[12:47:26]
ACRN:\>sdafkljsdkaljfklsadjflksdjafjsda^H ^H^H... ^M ^M[12:47:31] Error: Invalid
command. ``` After strip escape key, the log is like: ``` [12:49:18]
ACRN:\> [12:49:19] ACRN:\> [12:49:19] ACRN:\>ls [12:49:19] Error: Invalid
command. [12:49:19] ACRN:\> [12:49:19] ACRN:\>dfaslhj [12:49:24] Error: Invalid
command. ``` Beside escape key, it also handle backspace key as well.
--------------------------------------------------------------------------------
ChangeLog:
* Sat Jun 18 2022 Robert Scheck <[email protected]> 1.40-1
- Upgrade to 1.40 (#2098148)
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #2098148 - tio-1.40 is available
https://bugzilla.redhat.com/show_bug.cgi?id=2098148
--------------------------------------------------------------------------------
_______________________________________________
epel-devel mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Fedora Code of Conduct:
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives:
https://lists.fedoraproject.org/archives/list/[email protected]
Do not reply to spam on the list, report it:
https://pagure.io/fedora-infrastructure