Name: | chromium-headless |
---|---|
Version: | 122.0.6261.94 |
Release: | 1.el9 |
Architecture: | x86_64 |
Group: | Unspecified |
Size: | 179405299 |
License: | BSD-3-Clause AND LGPL-2.1-or-later AND Apache-2.0 AND IJG AND MIT AND GPL-2.0-or-later AND ISC AND OpenSSL AND (MPL-1.1 OR GPL-2.0-only OR LGPL-2.0-only) |
RPM: | chromium-headless-122.0.6261.94-1.el9.x86_64.rpm |
Source RPM: | chromium-122.0.6261.94-1.el9.src.rpm |
Build Date: | Tue Mar 12 2024 |
Build Host: | build-ol9-x86_64.oracle.com |
Vendor: | Oracle America |
URL: | http://www.chromium.org/Home |
Summary: | A minimal headless shell built from Chromium |
Description: | A minimal headless client built from Chromium. headless_shell is built without support for alsa, cups, dbus, gconf, gio, kerberos, pulseaudio, or udev. |
- upstream security release 122.0.6261.94 * High : Type Confusion in V8 - fixed bz#2265957, added correct platform in chromium use agent
- Make building of chromedriver optional
- Rebuilt for java-21-openjdk as system jdk
- update to 122.0.6261.69 - fix build error on el8 - bz#2265039, built with -fwrapv for improved memory safety - bz#2265043, built with -ftrivial-auto-var-init=zero for improved security and preditability
- update to 122.0.6261.57 * High CVE-2024-1669: Out of bounds memory access in Blink * High CVE-2024-1670: Use after free in Mojo * Medium CVE-2024-1671: Inappropriate implementation in Site Isolation * Medium CVE-2024-1672: Inappropriate implementation in Content Security Policy * Medium CVE-2024-1673: Use after free in Accessibility * Medium CVE-2024-1674: Inappropriate implementation in Navigation * Medium CVE-2024-1675: Insufficient policy enforcement in Download * Low CVE-2024-1676: Inappropriate implementation in Navigation.
- update to 122.0.6261.39
- update to 121.0.6167.184
- update to 121.0.6167.160 * High CVE-2024-1284: Use after free in Mojo * High CVE-2024-1283: Heap buffer overflow in Skia
- Support for 64K pages on Linux/AArch64
- update to 121.0.6167.139 * High CVE-2024-1060: Use after free in Canvas * High CVE-2024-1059: Use after free in WebRTC * High CVE-2024-1077: Use after free in Network