| Name: | chromedriver | 
  
  | Version: | 129.0.6668.70 | 
  | Release: | 1.el8 | 
  | Architecture: | x86_64 | 
  
  | Group: | Unspecified | 
  
  | Size: | 18468423 | 
  | License: | BSD-3-Clause AND LGPL-2.1-or-later AND Apache-2.0 AND IJG AND MIT AND GPL-2.0-or-later AND ISC AND OpenSSL AND (MPL-1.1 OR GPL-2.0-only OR LGPL-2.0-only) | 
  
    | RPM: | 
    
      
      chromedriver-129.0.6668.70-1.el8.x86_64.rpm
      
     | 
  
  
    | Source RPM: | 
    
      
      chromium-129.0.6668.70-1.el8.src.rpm
      
     | 
  
  | Build Date: | Sat Sep 28 2024 | 
  | Build Host: | build-ol8-x86_64.oracle.com | 
  | Vendor: | Oracle America | 
  | URL: | http://www.chromium.org/Home | 
  | Summary: | WebDriver for Google Chrome/Chromium | 
  | Description: | WebDriver is an open source tool for automated testing of webapps across many
browsers. It provides capabilities for navigating to web pages, user input,
JavaScript execution, and more. ChromeDriver is a standalone server which
implements WebDriver's wire protocol for Chromium. It is being developed by
members of the Chromium and WebDriver teams.  | 
  
  - 
    Wed Sep 25 2024 Than Ngo <than@redhat.com> - 129.0.6668.70-1
    
- update to 129.0.6668.70
  * High CVE-2024-9120: Use after free in Dawn
  * High CVE-2024-9121: Inappropriate implementation in V8
  * High CVE-2024-9122: Type Confusion in V8
  * High CVE-2024-9123: Integer overflow in Skia
   
  
  - 
    Thu Sep 19 2024 Than Ngo <than@redhat.com> - 129.0.6668.58-2
    
- clean up
   
  
  - 
    Tue Sep 17 2024 Than Ngo <than@redhat.com> - 129.0.6668.58-1
    
- update to 129.0.6668.58
  * High CVE-2024-8904: Type Confusion in V8
  * Medium CVE-2024-8905: Inappropriate implementation in V8
  * Medium CVE-2024-8906: Incorrect security UI in Downloads
  * Medium CVE-2024-8907: Insufficient data validation in Omnibox
  * Low CVE-2024-8908: Inappropriate implementation in Autofill
  * Low CVE-2024-8909: Inappropriate implementation in UI
   
  
  - 
    Wed Sep 11 2024 Than Ngo <than@redhat.com> - 128.0.6613.137-1
    
- update to 128.0.6613.137
  * High CVE-2024-8636: Heap buffer overflow in Skia
  * High CVE-2024-8637: Use after free in Media Router
  * High CVE-2024-8638: Type Confusion in V8
  * High CVE-2024-8639: Use after free in Autofill
   
  
  - 
    Thu Sep 05 2024 Than Ngo <than@redhat.com> - 128.0.6613.119-1
    
- update to 128.0.6613.119
  * High CVE-2024-8362: Use after free in WebAudio
  * High CVE-2024-7970: Out of bounds write in V8
   
  
  - 
    Wed Aug 07 2024 Than Ngo <than@redhat.com> - 127.0.6533.99-1
    
- update to 127.0.6533.99
  * Critical CVE-2024-7532: Out of bounds memory access in ANGLE
  * High CVE-2024-7533: Use after free in Sharing
  * High CVE-2024-7550: Type Confusion in V8
  * High CVE-2024-7534: Heap buffer overflow in Layout
  * High CVE-2024-7535: Inappropriate implementation in V8
  * High CVE-2024-7536: Use after free in WebAudio
   
  
  - 
    Tue Aug 06 2024 Than Ngo <than@redhat.com> - 127.0.6533.88-3
    
- fix rhbz#2294773 - Allow enabling vulkan on ozone wayland for AMD vaapi
- add ppc64le patch to fix runtime assertion trap on ppc64el systems
- refresh ppc64le patch to work around broken 64k allocator code on arm64
   
  
  - 
    Thu Aug 01 2024 Than Ngo <than@redhat.com> - 127.0.6533.88-2
    
- remove old patch that seems to be the cause of a crash
  when the user set user.max_user_namespaces to 0
   
  
  - 
    Wed Jul 31 2024 Than Ngo <than@redhat.com> - 127.0.6533.88-1
    
- update to 127.0.6533.88
   
  
  - 
    Wed Jul 24 2024 Than Ngo <than@redhat.com> - 127.0.6533.72-1
    
- update to 127.0.6533.72
	* CVE-2024-6988: Use after free in Downloads
	* CVE-2024-6989: Use after free in Loader
	* CVE-2024-6991: Use after free in Dawn
	* CVE-2024-6992: Out of bounds memory access in ANGLE
	* CVE-2024-6993: Inappropriate implementation in Canvas
	* CVE-2024-6994: Heap buffer overflow in Layout
	* CVE-2024-6995: Inappropriate implementation in Fullscreen
	* CVE-2024-6996: Race in Frames
	* CVE-2024-6997: Use after free in Tabs
	* CVE-2024-6998: Use after free in User Education
	* CVE-2024-6999: Inappropriate implementation in FedCM
	* CVE-2024-7000: Use after free in CSS. Reported by Anonymous
	* CVE-2024-7001: Inappropriate implementation in HTML
	* CVE-2024-7003: Inappropriate implementation in FedCM
	* CVE-2024-7004: Insufficient validation of untrusted input in Safe Browsing
	* CVE-2024-7005: Insufficient validation of untrusted input in Safe