Back to chromium-browser PTS page

Accepted chromium-browser 69.0.3497.81-1 (source) into unstable



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Wed, 05 Sep 2018 00:01:50 +0000
Source: chromium-browser
Binary: chromium chromium-l10n chromium-shell chromium-driver chromium-common
Architecture: source
Version: 69.0.3497.81-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Chromium Team <chromium-browser@packages.debian.org>
Changed-By: Michael Gilbert <mgilbert@debian.org>
Description:
 chromium   - web browser
 chromium-common - web browser - common resources used by the chromium packages
 chromium-driver - web browser - WebDriver support
 chromium-l10n - web browser - language packs
 chromium-shell - web browser - minimal shell
Changes:
 chromium-browser (69.0.3497.81-1) unstable; urgency=medium
 .
   * New upstream stable release.
     - CVE-2018-16065: Out of bounds write in V8. Reported by Brendon Tiszka
     - CVE-2018-16066: Out of bounds read in Blink. Reported by cloudfuzzer
     - CVE-2018-16067: Out of bounds read in WebAudio. Reported by Zhe Jin
     - CVE-2018-16068: Out of bounds write in Mojo. Reported by Mark Brand
     - CVE-2018-16069: Out of bounds read in SwiftShader. Reported by Mark Brand
     - CVE-2018-16070: Integer overflow in Skia. Reported by Ivan Fratric
     - CVE-2018-16071: Use after free in WebRTC. Reported by Natalie Silvanovich
     - CVE-2018-16073: Site Isolation bypass after tab restore. Reported by Jun
       Kokatsu
     - CVE-2018-16074: Site Isolation bypass using Blob URLS. Reported by Jun
       Kokatsu
     - CVE-2018-16075: Local file access in Blink. Reported by Pepe Vila
     - CVE-2018-16076: Out of bounds read in PDFium. Reported by Aleksandar
       Nikolic
     - CVE-2018-16077: Content security policy bypass in Blink. Reported by
       Manuel Caballero
     - CVE-2018-16078: Credit card information leak in Autofill. Reported by
       Cailan Sacks
     - CVE-2018-16079: URL spoof in permission dialogs. Reported by Markus
       Vervier and Michele OrrĂ¹
     - CVE-2018-16080: URL spoof in full screen mode. Reported by Khalil Zhani
     - CVE-2018-16081: Local file access in DevTools. Reported by Jann Horn
     - CVE-2018-16082: Stack buffer overflow in SwiftShader. Reported by Omair
     - CVE-2018-16083: Out of bounds read in WebRTC. Reported by Natalie
       Silvanovich
     - CVE-2018-16084: User confirmation bypass in external protocol handling.
       Reported by Jun Kokatsu
     - CVE-2018-16085: Use after free in Memory Instrumentation. Reported by
       Roman Kuksin
Checksums-Sha1:
 bf55c376165bce27d62115f3fb7c7c022c801311 4198 chromium-browser_69.0.3497.81-1.dsc
 0695bbc23da4160e9ce0e4dc43e1ea71ac4dbf0a 237086156 chromium-browser_69.0.3497.81.orig.tar.xz
 00c5abc24ad2d213f083a8628f26de2a899ef9a4 146800 chromium-browser_69.0.3497.81-1.debian.tar.xz
 0c3b629922fc538a9337b51839fc1346e707a605 19477 chromium-browser_69.0.3497.81-1_source.buildinfo
Checksums-Sha256:
 f96189aca52237157d397288bed0ddce45b65201349285a824efbb705d715a68 4198 chromium-browser_69.0.3497.81-1.dsc
 4eea1bbf8555ab56c9f93d2bde6541c30ab80d8f2d708ed39c9b0d52667658ee 237086156 chromium-browser_69.0.3497.81.orig.tar.xz
 431efb81351bcb26d1676b366a409aebb19e8f2444c68683e334040f407c7842 146800 chromium-browser_69.0.3497.81-1.debian.tar.xz
 a85b4a52895eb92009aaaed5f9771647d93a2e87997fc6f9fdbcc40a343b0b0c 19477 chromium-browser_69.0.3497.81-1_source.buildinfo
Files:
 fd4b74cad3657d2d22a9e9d52c8ff907 4198 web optional chromium-browser_69.0.3497.81-1.dsc
 75670f17fa49b226a78391390ebca1d9 237086156 web optional chromium-browser_69.0.3497.81.orig.tar.xz
 e3bb2d00c242a27c3818cb4db7d37587 146800 web optional chromium-browser_69.0.3497.81-1.debian.tar.xz
 fa3efa69aa05cc2386686c9f9e78a77c 19477 web optional chromium-browser_69.0.3497.81-1_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=cfAP
-----END PGP SIGNATURE-----