Back to chromium-browser PTS page

Accepted chromium-browser 70.0.3538.67-1~deb9u1 (source) into proposed-updates->stable-new, proposed-updates



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Wed, 31 Oct 2018 00:46:08 +0000
Source: chromium-browser
Binary: chromium chromium-l10n chromium-shell chromium-widevine chromium-driver chromedriver
Architecture: source
Version: 70.0.3538.67-1~deb9u1
Distribution: stretch-security
Urgency: medium
Maintainer: Debian Chromium Maintainers <pkg-chromium-maint@lists.alioth.debian.org>
Changed-By: Michael Gilbert <mgilbert@debian.org>
Description:
 chromedriver - web browser - WebDriver support transitional package
 chromium   - web browser
 chromium-driver - web browser - WebDriver support
 chromium-l10n - web browser - language packs
 chromium-shell - web browser - minimal shell
 chromium-widevine - web browser - widevine content decryption support
Changes:
 chromium-browser (70.0.3538.67-1~deb9u1) stretch-security; urgency=medium
 .
   * New upstream stable release.
     - CVE-2018-17462: Sandbox escape in AppCache. Reported by Ned Williamson
       and Niklas Baumstark
     - CVE-2018-17463: Remote code execution in V8. Reported by Ned Williamson
       and Niklas Baumstark
     - Heap buffer overflow in Little CMS in PDFium. Reported by Quang Nguyễn
     - CVE-2018-17464: URL spoof in Omnibox. Reported by xisigr
     - CVE-2018-17465: Use after free in V8. Reported by Lin Zuojian
     - CVE-2018-17466: Memory corruption in Angle. Reported by Omair
     - CVE-2018-17467: URL spoof in Omnibox. Reported by Khalil Zhani
     - CVE-2018-17468: Cross-origin URL disclosure in Blink. Reported by James
       Lee
     - CVE-2018-17469: Heap buffer overflow in PDFium. Reported by Zhen Zhou
     - CVE-2018-17470: Memory corruption in GPU Internals. Reported by Zhe Jin
     - CVE-2018-17471: Security UI occlusion in full screen mode. Reported by
       Lnyas Zhang
     - CVE-2018-17473: URL spoof in Omnibox. Reported by Khalil Zhani
     - CVE-2018-17474: Use after free in Blink. Reported by Zhe Jin
     - CVE-2018-17475: URL spoof in Omnibox. Reported by Vladimir Metnew
     - CVE-2018-17476: Security UI occlusion in full screen mode. Reported by
       Khalil Zhani
     - CVE-2018-5179: Lack of limits on update() in ServiceWorker. Reported by
       Yannic Bonenberger
     - CVE-2018-17477: UI spoof in Extensions. Reported by Aaron Muir Hamilton
Checksums-Sha1:
 f8ad596e64a384ebd54682cfe040ba4e1d9047dc 4370 chromium-browser_70.0.3538.67-1~deb9u1.dsc
 7a36f291c4b36b7dec2ef8b9e82e20153deae1e8 205802572 chromium-browser_70.0.3538.67.orig.tar.xz
 65ec4022e2c146c48dabbb4358391e7654411317 159220 chromium-browser_70.0.3538.67-1~deb9u1.debian.tar.xz
 b1a330bd4110ef888fb8317f2b804f3d71559d7f 20048 chromium-browser_70.0.3538.67-1~deb9u1_source.buildinfo
Checksums-Sha256:
 4973587ccd80fcb01cf2bf62ef52624ce225dd3b558a9aa3da3d61331169f98e 4370 chromium-browser_70.0.3538.67-1~deb9u1.dsc
 8b5a3ec76bb4f158e5716d5782df746cf8f4b737126c9ba0b47d1962d586ffa7 205802572 chromium-browser_70.0.3538.67.orig.tar.xz
 adffe64c53573d17477180a53c343a6330138cb8b2e7fe41a7b1d7a1fc459b7d 159220 chromium-browser_70.0.3538.67-1~deb9u1.debian.tar.xz
 65196936c77e1a5fd74071f4776e9b0de8508bf41be8bfbbe6d405ce5076754d 20048 chromium-browser_70.0.3538.67-1~deb9u1_source.buildinfo
Files:
 fa109d3f45319bdbd293434ece8c7fd5 4370 web optional chromium-browser_70.0.3538.67-1~deb9u1.dsc
 e948e133f96a511a2ec1aaa7a18955e8 205802572 web optional chromium-browser_70.0.3538.67.orig.tar.xz
 934c22f01be1ec501033c158c56259f5 159220 web optional chromium-browser_70.0.3538.67-1~deb9u1.debian.tar.xz
 1a914147d1e5716480d925b5330b8eca 20048 web optional chromium-browser_70.0.3538.67-1~deb9u1_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=hEvb
-----END PGP SIGNATURE-----