Fedora Linux 8637 Published by

The following two security updates are available for Fedora Linux 39:

Fedora 39 Update: chromium-126.0.6478.55-1.fc39
Fedora 39 Update: cyrus-imapd-3.8.3-1.fc39




Fedora 39 Update: chromium-126.0.6478.55-1.fc39


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2024-86e4115138
2024-06-14 04:42:38.911001
--------------------------------------------------------------------------------

Name : chromium
Product : Fedora 39
Version : 126.0.6478.55
Release : 1.fc39
URL : http://www.chromium.org/Home
Summary : A WebKit (Blink) powered web browser that Google doesn't want you to use
Description :
Chromium is an open-source web browser, powered by WebKit (Blink).

--------------------------------------------------------------------------------
Update Information:

update to 126.0.6478.55
High CVE-2024-5830: Type Confusion in V8
High CVE-2024-5831: Use after free in Dawn
High CVE-2024-5832: Use after free in Dawn
High CVE-2024-5833: Type Confusion in V8
High CVE-2024-5834: Inappropriate implementation in Dawn
High CVE-2024-5835: Heap buffer overflow in Tab Groups
High CVE-2024-5836: Inappropriate Implementation in DevTools
High CVE-2024-5837: Type Confusion in V8
High CVE-2024-5838: Type Confusion in V8
Medium CVE-2024-5839: Inappropriate Implementation in Memory Allocator
Medium CVE-2024-5840: Policy Bypass in CORS
Medium CVE-2024-5841: Use after free in V8
Medium CVE-2024-5842: Use after free in Browser UI
Medium CVE-2024-5843: Inappropriate implementation in Downloads
Medium CVE-2024-5844: Heap buffer overflow in Tab Strip
Medium CVE-2024-5845: Use after free in Audio
Medium CVE-2024-5846: Use after free in PDFium
Medium CVE-2024-5847: Use after free in PDFium
--------------------------------------------------------------------------------
ChangeLog:

* Wed Jun 12 2024 Than Ngo [than@redhat.com] - 126.0.6478.55-1
- update to 126.0.6478.55
* High CVE-2024-5830: Type Confusion in V8
* High CVE-2024-5831: Use after free in Dawn
* High CVE-2024-5832: Use after free in Dawn
* High CVE-2024-5833: Type Confusion in V8
* High CVE-2024-5834: Inappropriate implementation in Dawn
* High CVE-2024-5835: Heap buffer overflow in Tab Groups
* High CVE-2024-5836: Inappropriate Implementation in DevTools
* High CVE-2024-5837: Type Confusion in V8
* High CVE-2024-5838: Type Confusion in V8
* Medium CVE-2024-5839: Inappropriate Implementation in Memory Allocator
* Medium CVE-2024-5840: Policy Bypass in CORS
* Medium CVE-2024-5841: Use after free in V8
* Medium CVE-2024-5842: Use after free in Browser UI
* Medium CVE-2024-5843: Inappropriate implementation in Downloads
* Medium CVE-2024-5844: Heap buffer overflow in Tab Strip
* Medium CVE-2024-5845: Use after free in Audio
* Medium CVE-2024-5846: Use after free in PDFium
* Medium CVE-2024-5847: Use after free in PDFium
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2291363 - 126.0.6478.54 is available, fixing 21 CVEs
https://bugzilla.redhat.com/show_bug.cgi?id=2291363
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2024-86e4115138' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
--



Fedora 39 Update: cyrus-imapd-3.8.3-1.fc39


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2024-123f2b3666
2024-06-14 04:42:38.910851
--------------------------------------------------------------------------------

Name : cyrus-imapd
Product : Fedora 39
Version : 3.8.3
Release : 1.fc39
URL : http://www.cyrusimap.org/
Summary : A high-performance email, contacts and calendar server
Description :
The Cyrus IMAP (Internet Message Access Protocol) server provides access to
personal mail, system-wide bulletin boards, news-feeds, calendar and contacts
through the IMAP, JMAP, NNTP, CalDAV and CardDAV protocols. The Cyrus IMAP
server is a scalable enterprise groupware system designed for use from small to
large enterprise environments using technologies based on well-established Open
Standards.

A full Cyrus IMAP implementation allows a seamless mail and bulletin board
environment to be set up across one or more nodes. It differs from other IMAP
server implementations in that it is run on sealed nodes, where users are not
normally permitted to log in. The mailbox database is stored in parts of the
filesystem that are private to the Cyrus IMAP system. All user access to mail
is through software using the IMAP, IMAPS, JMAP, POP3, POP3S, KPOP, CalDAV
and/or CardDAV protocols.

The private mailbox database design gives the Cyrus IMAP server large
advantages in efficiency, scalability, and administratability. Multiple
concurrent read/write connections to the same mailbox are permitted. The server
supports access control lists on mailboxes and storage quotas on mailbox
hierarchies.

--------------------------------------------------------------------------------
Update Information:

Security fix for CVE-2024-34055
--------------------------------------------------------------------------------
ChangeLog:

* Wed Jun 5 2024 Martin Osvald [mosvald@redhat.com] - 3.8.3-1
- Fix CVE-2024-34055 (rhbz#2290512)
- Convert to %autorelease and %autochangelog
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2290510 - CVE-2024-34055 cyrus-imapd: unbounded memory allocation by sending many LITERALs in a single command
https://bugzilla.redhat.com/show_bug.cgi?id=2290510
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2024-123f2b3666' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
--