Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

chromium-headless-debuginfo-148.0.7778.96-1.fc42 RPM for ppc64le

From Fedora 42 testing updates for ppc64le / debug / Packages / c

Name: chromium-headless-debuginfo Distribution: Fedora Project
Version: 148.0.7778.96 Vendor: Fedora Project
Release: 1.fc42 Build date: Fri May 8 18:19:48 2026
Group: Development/Debug Build host: buildvm-ppc64le-21.rdu3.fedoraproject.org
Size: 113091341 Source RPM: chromium-148.0.7778.96-1.fc42.src.rpm
Packager: Fedora Project
Url: http://www.chromium.org/Home
Summary: Debug information for package chromium-headless
This package provides debug information for package chromium-headless.
Debug information is useful when developing applications that use this
package or when debugging this package.

Provides

Requires

License

BSD-3-Clause AND LGPL-2.1-or-later AND Apache-2.0 AND IJG AND MIT AND GPL-2.0-or-later AND ISC AND OpenSSL AND (MPL-1.1 OR GPL-2.0-only OR LGPL-2.0-only)

Changelog

* Wed May 06 2026 Than Ngo <than@redhat.com> - 148.0.7778.96-1
  - Update to 148.0.7778.96
     * CVE-2026-7896: Integer overflow in Blink
     * CVE-2026-7897: Use after free in Mobile
     * CVE-2026-7898: Use after free in Chromoting
     * CVE-2026-7899: Out of bounds read and write in V8
     * CVE-2026-7900: Heap buffer overflow in ANGLE
     * CVE-2026-7901: Use after free in ANGLE
     * CVE-2026-7902: Out of bounds memory access in V8
     * CVE-2026-7903: Integer overflow in ANGLE
     * CVE-2026-7904: Out of bounds read in Fonts
     * CVE-2026-7905: Insufficient validation of untrusted input in Media
     * CVE-2026-7906: Use after free in SVG
     * CVE-2026-7907: Use after free in DOM
     * CVE-2026-7908: Use after free in Fullscreen
     * CVE-2026-7909: Inappropriate implementation in ServiceWorker
     * CVE-2026-7910: Use after free in Views
     * CVE-2026-7911: Use after free in Aura
     * CVE-2026-7912: Integer overflow in GPU
     * CVE-2026-7913: Insufficient policy enforcement in DevTools
     * CVE-2026-7914: Type Confusion in Accessibility
     * CVE-2026-7915: Insufficient data validation in DevTools
     * CVE-2026-7916: Insufficient data validation in InterestGroups
     * CVE-2026-7917: Use after free in Fullscreen
     * CVE-2026-7918: Use after free in GPU
     * CVE-2026-7919: Use after free in Aura
     * CVE-2026-7920: Use after free in Skia
     * CVE-2026-7921: Use after free in Passwords
     * CVE-2026-7922: Use after free in ServiceWorker
     * CVE-2026-7923: Out of bounds write in Skia
     * CVE-2026-7924: Uninitialized Use in Dawn
     * CVE-2026-7925: Use after free in Chromoting
     * CVE-2026-7926: Use after free in PresentationAPI
     * CVE-2026-7927: Type Confusion in Runtime
     * CVE-2026-7928: Use after free in WebRTC
     * CVE-2026-7929: Use after free in MediaRecording
     * CVE-2026-7930: Insufficient validation of untrusted input in Cookies
     * CVE-2026-7931: Insufficient validation of untrusted input in iOS
     * CVE-2026-7932: Insufficient policy enforcement in Downloads
     * CVE-2026-7933: Out of bounds read in WebCodecs
     * CVE-2026-7934: Insufficient validation of untrusted input in Popup Blocker
     * CVE-2026-7935: Inappropriate implementation in Speech
     * CVE-2026-7936: Object lifecycle issue in V8
     * CVE-2026-7937: Insufficient policy enforcement in DevTools
     * CVE-2026-7938: Use after free in CSS
     * CVE-2026-7939: Inappropriate implementation in SanitizerAPI
     * CVE-2026-7940: Use after free in V8
     * CVE-2026-7941: Insufficient validation of untrusted input in Mobile
     * CVE-2026-7942: Integer overflow in ANGLE
     * CVE-2026-7943: Insufficient validation of untrusted input in ANGLE
     * CVE-2026-7944: Insufficient validation of untrusted input in Persistent Cache
     * CVE-2026-7945: Insufficient validation of untrusted input in COOP
     * CVE-2026-7946: Insufficient policy enforcement in WebUI
     * CVE-2026-7947: Insufficient validation of untrusted input in Network
     * CVE-2026-7948: Race in Chromoting
     * CVE-2026-7949: Out of bounds read in Skia
     * CVE-2026-7950: Out of bounds read and write in GFX
     * CVE-2026-7951: Out of bounds write in WebRTC
     * CVE-2026-7952: Insufficient policy enforcement in Extensions
     * CVE-2026-7953: Insufficient validation of untrusted input in Omnibox
     * CVE-2026-7954: Race in Shared Storage
     * CVE-2026-7955: Uninitialized Use in GPU
     * CVE-2026-7956: Use after free in Navigation
     * CVE-2026-7957: Out of bounds write in Media
     * CVE-2026-7958: Inappropriate implementation in ServiceWorker
     * CVE-2026-7959: Inappropriate implementation in Navigation
     * CVE-2026-7960: Race in Speech
     * CVE-2026-7961: Insufficient validation of untrusted input in Permissions
     * CVE-2026-7962: Insufficient policy enforcement in DirectSockets
     * CVE-2026-7963: Inappropriate implementation in ServiceWorker
     * CVE-2026-7964: Insufficient validation of untrusted input in FileSystem
     * CVE-2026-7965: Insufficient validation of untrusted input in DevTools
     * CVE-2026-7966: Insufficient validation of untrusted input in SiteIsolation
     * CVE-2026-7967: Insufficient validation of untrusted input in Navigation
     * CVE-2026-7968: Insufficient validation of untrusted input in CORS
     * CVE-2026-7969: Integer overflow in Network
     * CVE-2026-7970: Use after free in TopChrome
     * CVE-2026-7971: Inappropriate implementation in ORB
     * CVE-2026-7972: Uninitialized Use in GPU
     * CVE-2026-7973: Integer overflow in Dawn
     * CVE-2026-7974: Use after free in Blink
     * CVE-2026-7975: Use after free in DevTools
     * CVE-2026-7976: Use after free in Views
     * CVE-2026-7977: Inappropriate implementation in Canvas
     * CVE-2026-7978: Inappropriate implementation in Companion
     * CVE-2026-7979: Inappropriate implementation in Media
     * CVE-2026-7980: Use after free in WebAudio
     * CVE-2026-7981: Out of bounds read in Codecs
     * CVE-2026-7982: Uninitialized Use in WebCodecs
     * CVE-2026-7983: Out of bounds read in Dawn
     * CVE-2026-7984: Use after free in ReadingMode
     * CVE-2026-7985: Use after free in GPU
     * CVE-2026-7986: Insufficient policy enforcement in Autofill
     * CVE-2026-7987: Use after free in WebRTC
     * CVE-2026-7988: Type Confusion in WebRTC
     * CVE-2026-7989: Insufficient data validation in DataTransfer
     * CVE-2026-7990: Insufficient validation of untrusted input in Updater
     * CVE-2026-7991: Use after free in UI
     * CVE-2026-7992: Insufficient validation of untrusted input in UI
     * CVE-2026-7993: Insufficient validation of untrusted input in Payments
     * CVE-2026-7994: Inappropriate implementation in Chromoting
     * CVE-2026-7995: Out of bounds read in AdFilter
     * CVE-2026-7996: Insufficient validation of untrusted input in SSL
     * CVE-2026-7997: Insufficient validation of untrusted input in Updater
     * CVE-2026-7998: Insufficient validation of untrusted input in Dialog
     * CVE-2026-7999: Inappropriate implementation in V8
     * CVE-2026-8000: Insufficient validation of untrusted input in ChromeDriver
     * CVE-2026-8001: Use after free in Printing
     * CVE-2026-8002: Use after free in Audio
     * CVE-2026-8003: Insufficient validation of untrusted input in TabGroups
     * CVE-2026-8004: Insufficient policy enforcement in DevTools
     * CVE-2026-8005: Insufficient validation of untrusted input in Cast
     * CVE-2026-8006: Insufficient policy enforcement in DevTools
     * CVE-2026-8007: Insufficient validation of untrusted input in Cast
     * CVE-2026-8008: Inappropriate implementation in DevTools
     * CVE-2026-8009: Inappropriate implementation in Cast
     * CVE-2026-8010: Insufficient validation of untrusted input in SiteIsolation
     * CVE-2026-8011: Insufficient policy enforcement in Search
     * CVE-2026-8012: Inappropriate implementation in MHTML
     * CVE-2026-8013: Insufficient validation of untrusted input in FedCM
     * CVE-2026-8014: Inappropriate implementation in Preload
     * CVE-2026-8015: Inappropriate implementation in Media
     * CVE-2026-8016: Use after free in WebRTC
     * CVE-2026-8017: Side-channel information leakage in Media
     * CVE-2026-8018: Insufficient policy enforcement in DevTools
     * CVE-2026-8019: Insufficient policy enforcement in WebApp
     * CVE-2026-8020: Uninitialized Use in GPU
     * CVE-2026-8021: Script injection in UI
     * CVE-2026-8022: Inappropriate implementation in MHTML
  - Remove old remoting-no-tests patch
  - Remove fix_GL_native_pixmap_import_support_reset_in_GpuInit patch
  - Fix build error causing by sanitizer defines in GN
  - Refresh rust-enable-unstable_feature patch
  - Fix build error with system rust compiler
  - Fix build error causing by new clang++ options which are not supported yet
  - Fix build error causing by harfbuzz library rename
* Wed Apr 29 2026 Than Ngo <than@redhat.com> - 147.0.7727.137-1
  - Update to 147.0.7727.137
     * Critical CVE-2026-7363: Use after free in Canvas
     * Critical CVE-2026-7361: Use after free in iOS
     * Critical CVE-2026-7344: Use after free in Accessibility
     * Critical CVE-2026-7343: Use after free in Views
     * High CVE-2026-7333: Use after free in GPU
     * High CVE-2026-7360: Insufficient validation of untrusted input in Compositing
     * High CVE-2026-7359: Use after free in ANGLE
     * High CVE-2026-7358: Use after free in Animation
     * High CVE-2026-7334: Use after free in Views
     * High CVE-2026-7357: Use after free in GPU
     * High CVE-2026-7356: Use after free in Navigation
     * High CVE-2026-7354: Out of bounds read and write in Angle
     * High CVE-2026-7353: Heap buffer overflow in Skia
     * High CVE-2026-7352: Use after free in Media
     * High CVE-2026-7351: Race in MHTML
     * High CVE-2026-7350: Use after free in WebMIDI
     * High CVE-2026-7349: Use after free in Cast
     * High CVE-2026-7348: Use after free in Codecs
     * High CVE-2026-7335: Use after free in media
     * High CVE-2026-7336: Use after free in WebRTC
     * High CVE-2026-7337: Type Confusion in V8
     * High CVE-2026-7347: Use after free in Chromoting
     * High CVE-2026-7346: Inappropriate implementation in Tint
     * High CVE-2026-7345: Insufficient validation of untrusted input in Feedback
     * High CVE-2026-7338: Use after free in Cast
     * High CVE-2026-7342: Use after free in WebView
     * High CVE-2026-7341: Use after free in WebRTC
     * Medium CVE-2026-7339: Heap buffer overflow in WebRTC
     * Medium CVE-2026-7340: Integer overflow in ANGLE
     * Medium CVE-2026-7355: Use after free in Media
* Sun Apr 26 2026 Than Ngo <than@redhat.com> - 147.0.7727.116-2
  - Fix FTBFS with rust 1.95
  - Backport the upstream fix GL native pixmap import support reset in GpuInit
* Thu Apr 23 2026 Than Ngo <than@redhat.com> - 147.0.7727.116-1
  - Update to 147.0.7727.116
    * High CVE-2026-6919: Use after free in DevTools
    * High CVE-2026-6920: Out of bounds read in GPU
    * Medium CVE-2026-6921: Race in GPU
  - Fix rhbz#2458171, unexpanded macros in manpage
* Wed Apr 15 2026 Than Ngo <than@redhat.com> - 147.0.7727.101-1
  - Update to 147.0.7727.101
    * Critical CVE-2026-6296: Heap buffer overflow in ANGLE
    * Critical CVE-2026-6297: Use after free in Proxy
    * Critical CVE-2026-6298: Heap buffer overflow in Skia
    * Critical CVE-2026-6299: Use after free in Prerender
    * Critical CVE-2026-6358: Use after free in XR
    * High CVE-2026-6359: Use after free in Video
    * High CVE-2026-6300: Use after free in CSS
    * High CVE-2026-6301: Type Confusion in Turbofan
    * High CVE-2026-6302: Use after free in Video
    * High CVE-2026-6303: Use after free in Codecs
    * High CVE-2026-6304: Use after free in Graphite
    * High CVE-2026-6305: Heap buffer overflow in PDFium
    * High CVE-2026-6306: Heap buffer overflow in PDFium
    * High CVE-2026-6307: Type Confusion in Turbofan
    * High CVE-2026-6308: Out of bounds read in Media
    * High CVE-2026-6309: Use after free in Viz
    * High CVE-2026-6360: Use after free in FileSystem
    * High CVE-2026-6310: Use after free in Dawn
    * High CVE-2026-6311: Uninitialized Use in Accessibility
    * High CVE-2026-6312: Insufficient policy enforcement in Passwords
    * High CVE-2026-6313: Insufficient policy enforcement in CORS
    * High CVE-2026-6314: Out of bounds write in GPU
    * High CVE-2026-6315: Use after free in Permissions
    * High CVE-2026-6316: Use after free in Forms
    * High CVE-2026-6361: Heap buffer overflow in PDFium
    * High CVE-2026-6362: Use after free in Codecs
    * High CVE-2026-6317: Use after free in Cast
    * Medium CVE-2026-6363: Type Confusion in V8
    * Medium CVE-2026-6318: Use after free in Codecs
    * Medium CVE-2026-6319: Use after free in Payments
    * Medium CVE-2026-6364: Out of bounds read in Skia
* Thu Apr 09 2026 Than Ngo <than@redhat.com> - 147.0.7727.55-1
  - Update to 147.0.7727.55
    * Critical CVE-2026-5858: Heap buffer overflow in WebML
    * Critical CVE-2026-5859: Integer overflow in WebML
    * High CVE-2026-5860: Use after free in WebRTC
    * High CVE-2026-5861: Use after free in V8
    * High CVE-2026-5862: Inappropriate implementation in V8
    * High CVE-2026-5863: Inappropri