Back to chromium PTS page

Accepted chromium 84.0.4147.89-1 (source) into experimental



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sun, 26 Jul 2020 15:21:41 +0000
Source: chromium
Architecture: source
Version: 84.0.4147.89-1
Distribution: experimental
Urgency: medium
Maintainer: Debian Chromium Team <chromium@packages.debian.org>
Changed-By: Michael Gilbert <mgilbert@debian.org>
Changes:
 chromium (84.0.4147.89-1) experimental; urgency=medium
 .
   * New upstream stable release.
     - CVE-2020-6510: Heap buffer overflow in background fetch. Reported by
       Leecraso and Guang Gong
     - CVE-2020-6511: Side-channel information leakage in content security
       policy. Reported by Mikhail Oblozhikhin
     - CVE-2020-6512: Type Confusion in V8. Reported by nocma, leogan, cheneyxu
     - CVE-2020-6513: Heap buffer overflow in PDFium. Reported by Aleksandar
       Nikolic
     - CVE-2020-6514: Inappropriate implementation in WebRTC. Reported by
       Natalie Silvanovich
     - CVE-2020-6515: Use after free in tab strip. Reported by DDV_UA
     - CVE-2020-6516: Policy bypass in CORS. Reported by Yongke Wang and Aryb1n
     - CVE-2020-6517: Heap buffer overflow in history. Reported by ZeKai Wu
     - CVE-2020-6518: Use after free in developer tools. Reported by David Erceg
     - CVE-2020-6519: Policy bypass in CSP. Reported by Gal Weizman
     - CVE-2020-6520: Heap buffer overflow in Skia. Reported by Zhen Zhou
     - CVE-2020-6521: Side-channel information leakage in autofill. Reported by
       Xu Lin, Panagiotis Ilia, Jason Polakis
     - CVE-2020-6522: Inappropriate implementation in external protocol
       handlers. Reported by Eric Lawrence
     - CVE-2020-6523: Out of bounds write in Skia. Reported by Liu Wei and Wu
       Zekai
     - CVE-2020-6524: Heap buffer overflow in WebAudio. Reported by Sung Ta
     - CVE-2020-6525: Heap buffer overflow in Skia. Reported by Zhen Zhou
     - CVE-2020-6526: Inappropriate implementation in iframe sandbox. Reported
       by Jonathan Kingston
     - CVE-2020-6527: Insufficient policy enforcement in CSP. Reported by Zhong
       Zhaochen
     - CVE-2020-6528: Incorrect security UI in basic auth. Reported by Rayyan
       Bijoora
     - CVE-2020-6529: Inappropriate implementation in WebRTC. Reported by
       kaustubhvats7
     - CVE-2020-6530: Out of bounds memory access in developer tools. Reported
       by myvyang
     - CVE-2020-6531: Side-channel information leakage in scroll to text.
       Reported by Jun Kokatsu
     - CVE-2020-6533: Type Confusion in V8. Reported by Avihay Cohen
     - CVE-2020-6534: Heap buffer overflow in WebRTC. Reported by Anonymous
     - CVE-2020-6535: Insufficient data validation in WebUI. Reported by Jun
       Kokatsu
     - CVE-2020-6536: Incorrect security UI in PWAs. Reported by Zhiyang Zeng
   * Update information in debian/copyright.
   * Include more upstream metadata information.
Checksums-Sha1:
 0c968cc3f52901ca5d4d558e9255ce4e1f0a821a 4294 chromium_84.0.4147.89-1.dsc
 920f2f2daa7741149ad22ceb086c9e2d6cb739c5 336746252 chromium_84.0.4147.89.orig.tar.xz
 257d8fc8f0e8037463b50e18d58265aa32f4dd72 163024 chromium_84.0.4147.89-1.debian.tar.xz
 8173fe93df4e4a16e3ef11be940bfe20161b4ba0 21790 chromium_84.0.4147.89-1_source.buildinfo
Checksums-Sha256:
 81edc4997c83a527e916b65f2a24e88d49b1814734cb3ccf5a75bfa31576d6c8 4294 chromium_84.0.4147.89-1.dsc
 ac540d43c8640db1e06072c7d46d4c7f7f9834e9981617fa5ce7dd20256a53f0 336746252 chromium_84.0.4147.89.orig.tar.xz
 9bbe216de3ae147e2451adf8a43aec2039d80afd33b30dfd10246ae02fd67d78 163024 chromium_84.0.4147.89-1.debian.tar.xz
 4c1436453102e581d9117cd7743c13b928cdfbc33aa77a7957a95ddf5114607c 21790 chromium_84.0.4147.89-1_source.buildinfo
Files:
 c577a6b6cc2158d6543b2813c5c607f8 4294 web optional chromium_84.0.4147.89-1.dsc
 c24af82c005132578048a01c12b79671 336746252 web optional chromium_84.0.4147.89.orig.tar.xz
 4a19708eb612b77ae04dcf09782ecd4c 163024 web optional chromium_84.0.4147.89-1.debian.tar.xz
 dbb45611b3821aad911f1b9d8615553f 21790 web optional chromium_84.0.4147.89-1_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=2Tet
-----END PGP SIGNATURE-----