Name: | chromedriver |
Version: | 127.0.6533.88 |
Release: | 2.el9 |
Architecture: | x86_64 |
Group: | Unspecified |
Size: | 18393649 |
License: | BSD-3-Clause AND LGPL-2.1-or-later AND Apache-2.0 AND IJG AND MIT AND GPL-2.0-or-later AND ISC AND OpenSSL AND (MPL-1.1 OR GPL-2.0-only OR LGPL-2.0-only) |
RPM: |
chromedriver-127.0.6533.88-2.el9.x86_64.rpm
|
Source RPM: |
chromium-127.0.6533.88-2.el9.src.rpm
|
Build Date: | Sat Aug 03 2024 |
Build Host: | build-ol9-x86_64.oracle.com |
Vendor: | Oracle America |
URL: | http://www.chromium.org/Home |
Summary: | WebDriver for Google Chrome/Chromium |
Description: | WebDriver is an open source tool for automated testing of webapps across many
browsers. It provides capabilities for navigating to web pages, user input,
JavaScript execution, and more. ChromeDriver is a standalone server which
implements WebDriver's wire protocol for Chromium. It is being developed by
members of the Chromium and WebDriver teams. |
-
Thu Aug 01 2024 Than Ngo <than@redhat.com> - 127.0.6533.88-2
- remove old patch that seems to be the cause of a crash
when the user set user.max_user_namespaces to 0
-
Wed Jul 31 2024 Than Ngo <than@redhat.com> - 127.0.6533.88-1
- update to 127.0.6533.88
-
Wed Jul 24 2024 Than Ngo <than@redhat.com> - 127.0.6533.72-1
- update to 127.0.6533.72
* CVE-2024-6988: Use after free in Downloads
* CVE-2024-6989: Use after free in Loader
* CVE-2024-6991: Use after free in Dawn
* CVE-2024-6992: Out of bounds memory access in ANGLE
* CVE-2024-6993: Inappropriate implementation in Canvas
* CVE-2024-6994: Heap buffer overflow in Layout
* CVE-2024-6995: Inappropriate implementation in Fullscreen
* CVE-2024-6996: Race in Frames
* CVE-2024-6997: Use after free in Tabs
* CVE-2024-6998: Use after free in User Education
* CVE-2024-6999: Inappropriate implementation in FedCM
* CVE-2024-7000: Use after free in CSS. Reported by Anonymous
* CVE-2024-7001: Inappropriate implementation in HTML
* CVE-2024-7003: Inappropriate implementation in FedCM
* CVE-2024-7004: Insufficient validation of untrusted input in Safe Browsing
* CVE-2024-7005: Insufficient validation of untrusted input in Safe
-
Sat Jul 20 2024 Than Ngo <than@redhat.com> - 126.0.6478.182-2
- fix condition for is_cfi/use_thin_lto on aarch64/ppc64le
- update powerpc patches
-
Tue Jul 16 2024 Than Ngo <than@redhat.com> - 126.0.6478.182-1
- update to 126.0.6478.182
* High CVE-2024-6772: Inappropriate implementation in V8
* High CVE-2024-6773: Type Confusion in V8
* High CVE-2024-6774: Use after free in Screen Capture
* High CVE-2024-6775: Use after free in Media Stream
* High CVE-2024-6776: Use after free in Audio
* High CVE-2024-6777: Use after free in Navigation
* High CVE-2024-6778: Race in DevTools
* High CVE-2024-6779: Out of bounds memory access in V8
-
Sun Jul 07 2024 Than Ngo <than@redhat.com> - 126.0.6478.126-2
- fixed rhbz#2293202, chromium Wayland UI regression
-
Tue Jun 25 2024 Than Ngo <than@redhat.com> - 126.0.6478.126-1
- update to 126.0.6478.126
* High CVE-2024-6290: Use after free in Dawn
* High CVE-2024-6291: Use after free in Swiftshader
* High CVE-2024-6292: Use after free in Dawn
* High CVE-2024-6293: Use after free in Dawn
-
Wed Jun 19 2024 Than Ngo <than@redhat.com> - 126.0.6478.114-1
- update to 126.0.6478.114
* High CVE-2024-6100: Type Confusion in V8
* High CVE-2024-6101: Inappropriate implementation in WebAssembly
* High CVE-2024-6102: Out of bounds memory access in Dawn
* High CVE-2024-6103: Use after free in Dawn
-
Wed Jun 12 2024 Than Ngo <than@redhat.com> - 126.0.6478.55-1
- update to 126.0.6478.55
* High CVE-2024-5830: Type Confusion in V8
* High CVE-2024-5831: Use after free in Dawn
* High CVE-2024-5832: Use after free in Dawn
* High CVE-2024-5833: Type Confusion in V8
* High CVE-2024-5834: Inappropriate implementation in Dawn
* High CVE-2024-5835: Heap buffer overflow in Tab Groups
* High CVE-2024-5836: Inappropriate Implementation in DevTools
* High CVE-2024-5837: Type Confusion in V8
* High CVE-2024-5838: Type Confusion in V8
* Medium CVE-2024-5839: Inappropriate Implementation in Memory Allocator
* Medium CVE-2024-5840: Policy Bypass in CORS
* Medium CVE-2024-5841: Use after free in V8
* Medium CVE-2024-5842: Use after free in Browser UI
* Medium CVE-2024-5843: Inappropriate implementation in Downloads
* Medium CVE-2024-5844: Heap buffer overflow in Tab Strip
* Medium CVE-2024-5845: Use after free in Audio
* Medium CVE-2024-5846: Use after free in PDFium
* Medium CVE-2024-5847: Use after free in PDFium
-
Fri May 31 2024 Than Ngo <than@redhat.com> - 125.0.6422.141-1
- update to 125.0.6422.141
* High CVE-2024-5493: Heap buffer overflow in WebRTC
* High CVE-2024-5494: Use after free in Dawn
* High CVE-2024-5495: Use after free in Dawn
* High CVE-2024-5496: Use after free in Media Session
* High CVE-2024-5497: Out of bounds memory access in Keyboard Inputs
* High CVE-2024-5498: Use after free in Presentation API
* High CVE-2024-5499: Out of bounds write in Streams API
- fixed rhbz#2264332 - Chromium is unable to send/receive video on MS Teams
- cleanup chromium.conf