Back to chromium PTS page

Accepted chromium 87.0.4280.88-0.4~deb10u1 (source) into proposed-updates->stable-new, proposed-updates



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Wed, 30 Dec 2020 09:26:45 +0100
Source: chromium
Architecture: source
Version: 87.0.4280.88-0.4~deb10u1
Distribution: buster-security
Urgency: high
Maintainer: Debian Chromium Team <chromium@packages.debian.org>
Changed-By: Jan Luca Naumann <j.naumann@fu-berlin.de>
Changes:
 chromium (87.0.4280.88-0.4~deb10u1) buster-security; urgency=high
 .
   * Non-maintainer upload.
   * New upstream stable release.
     - CVE-2020-6510: Heap buffer overflow in background fetch. Reported by
       Leecraso and Guang Gong
     - CVE-2020-6511: Side-channel information leakage in content security
       policy. Reported by Mikhail Oblozhikhin
     - CVE-2020-6512: Type Confusion in V8. Reported by nocma, leogan, cheneyxu
     - CVE-2020-6513: Heap buffer overflow in PDFium. Reported by Aleksandar
       Nikolic
     - CVE-2020-6514: Inappropriate implementation in WebRTC. Reported by
       Natalie Silvanovich
     - CVE-2020-6515: Use after free in tab strip. Reported by DDV_UA
     - CVE-2020-6516: Policy bypass in CORS. Reported by Yongke Wang and Aryb1n
     - CVE-2020-6517: Heap buffer overflow in history. Reported by ZeKai Wu
     - CVE-2020-6518: Use after free in developer tools. Reported by David Erceg
     - CVE-2020-6519: Policy bypass in CSP. Reported by Gal Weizman
     - CVE-2020-6520: Heap buffer overflow in Skia. Reported by Zhen Zhou
     - CVE-2020-6521: Side-channel information leakage in autofill. Reported by
       Xu Lin, Panagiotis Ilia, Jason Polakis
     - CVE-2020-6522: Inappropriate implementation in external protocol
       handlers. Reported by Eric Lawrence
     - CVE-2020-6523: Out of bounds write in Skia. Reported by Liu Wei and Wu
       Zekai
     - CVE-2020-6524: Heap buffer overflow in WebAudio. Reported by Sung Ta
     - CVE-2020-6525: Heap buffer overflow in Skia. Reported by Zhen Zhou
     - CVE-2020-6526: Inappropriate implementation in iframe sandbox. Reported
       by Jonathan Kingston
     - CVE-2020-6527: Insufficient policy enforcement in CSP. Reported by Zhong
       Zhaochen
     - CVE-2020-6528: Incorrect security UI in basic auth. Reported by Rayyan
       Bijoora
     - CVE-2020-6529: Inappropriate implementation in WebRTC. Reported by
       kaustubhvats7
     - CVE-2020-6530: Out of bounds memory access in developer tools. Reported
       by myvyang
     - CVE-2020-6531: Side-channel information leakage in scroll to text.
       Reported by Jun Kokatsu
     - CVE-2020-6533: Type Confusion in V8. Reported by Avihay Cohen
     - CVE-2020-6534: Heap buffer overflow in WebRTC. Reported by Anonymous
     - CVE-2020-6535: Insufficient data validation in WebUI. Reported by Jun
       Kokatsu
     - CVE-2020-6536: Incorrect security UI in PWAs. Reported by Zhiyang Zeng
     - CVE-2020-6537: Type Confusion in V8. Reported by Rong Jian and Guang Gong
     - CVE-2020-6532: Use after free in SCTP. Reported by Anonymous
     - CVE-2020-6538: Inappropriate implementation in WebView. Reported by
       Yongke Wang and Aryb1n
     - CVE-2020-6539: Use after free in CSS. Reported by Oriol Brufau
     - CVE-2020-6540: Heap buffer overflow in Skia. Reported by Zhen Zhou
     - CVE-2020-6541: Use after free in WebUSB. Reported by Sergei Glazunov
     - CVE-2020-16037: Use after free in clipboard. Reported by Ryoya Tsukasaki
     - CVE-2020-16038: Use after free in media. Reported by Khalil Zhani
     - CVE-2020-16039: Use after free in extensions. Reported by Anonymous
     - CVE-2020-16040: Insufficient data validation in V8. Reported by Lucas
       Pinheiro, Microsoft Browser Vulnerability Research
     - CVE-2020-16041: Out of bounds read in networking. Reported by Sergei
       Glazunov and Mark Brand of Google Project Zero
     - CVE-2020-16042: Uninitialized Use in V8. Reported by André Bargull
     - CVE-2020-16018: Use after free in payments. Reported by Man Yue Mo of
       GitHub Security Lab
     - CVE-2020-16019: Inappropriate implementation in filesystem. Reported by
       Rory McNamara
     - CVE-2020-16020: Inappropriate implementation in cryptohome. Reported by
       Rory McNamara
     - CVE-2020-16021: Race in ImageBurner. Reported by Rory McNamara
     - CVE-2020-16022: Insufficient policy enforcement in networking. Reported
       by @SamyKamkar
     - CVE-2020-16015: Insufficient data validation in WASM. Reported by Rong
       Jian and Leecraso of 360 Alpha Lab
     - CVE-2020-16014: Use after free in PPAPI. Reported by Rong Jian and
       Leecraso of 360 Alpha Lab
     - CVE-2020-16023: Use after free in WebCodecs. Reported by Brendon Tiszka
       and David Manouchehri supporting the @eff
     - CVE-2020-16024: Heap buffer overflow in UI. Reported by Sergei Glazunov
       of Google Project Zero
     - CVE-2020-16025: Heap buffer overflow in clipboard. Reported by Sergei
       Glazunov of Google Project Zero
     - CVE-2020-16026: Use after free in WebRTC. Reported by Jong-Gwon Kim
     - CVE-2020-16027: Insufficient policy enforcement in developer tools.
       Reported by David Erceg
     - CVE-2020-16028: Heap buffer overflow in WebRTC. Reported by asnine
     - CVE-2020-16029: Inappropriate implementation in PDFium. Reported by
       Anonymous
     - CVE-2020-16030: Insufficient data validation in Blink. Reported by Michał
       Bentkowski of Securitum
     - CVE-2019-8075: Insufficient data validation in Flash. Reported by
       Nethanel Gelernter, Cyberpion
     - CVE-2020-16031: Incorrect security UI in tab preview. Reported by
       wester0x01
     - CVE-2020-16032: Incorrect security UI in sharing. Reported by wester0x01
     - CVE-2020-16033: Incorrect security UI in WebUSB. Reported by Khalil Zhani
     - CVE-2020-16034: Inappropriate implementation in WebRTC. Reported by
       Benjamin Petermaier
     - CVE-2020-16035: Insufficient data validation in cros-disks. Reported by
       Rory McNamara
     - CVE-2020-16012: Side-channel information leakage in graphics. Reported by
       Aleksejs Popovs
     - CVE-2020-16036: Inappropriate implementation in cookies. Reported by Jun
       Kokatsu @shhnjk
     - CVE-2020-16013: Inappropriate implementation in V8. Reported by Anonymous
     - CVE-2020-16017: Use after free in site isolation. Reported by Anonymous
     - CVE-2020-16016: Inappropriate implementation in base. Reported by Rong
       Jian and Leecraso of 360 Alpha Lab
     - CVE-2020-16004: Use after free in user interface. Reported by Leecraso
       and Guang Gong of 360 Alpha Lab working with 360 BugCloud
     - CVE-2020-16005: Insufficient policy enforcement in ANGLE. Reported by
       Jaehun Jeong @n3sk of Theori
     - CVE-2020-16006: Inappropriate implementation in V8. Reported by Bill
       Parks
     - CVE-2020-16007: Insufficient data validation in installer. Reported by
       Abdelhamid Naceri
     - CVE-2020-16008: Stack buffer overflow in WebRTC. Reported by Tolya
       Korniltsev
     - CVE-2020-16009: Inappropriate implementation in V8. Reported by Clement
       Lecigne of Google's Threat Analysis Group and Samuel Groß of Google
       Project Zero
     - CVE-2020-16011: Heap buffer overflow in UI on Windows. Reported by Sergei
       Glazunov of Google Project Zero
     - CVE-2020-16000: Inappropriate implementation in Blink. Reported by
       amaebi_jp
     - CVE-2020-16001: Use after free in media. Reported by Khalil Zhani
     - CVE-2020-16002: Use after free in PDFium. Reported by Weipeng Jiang from
       Codesafe Team of Legendsec at Qi'anxin Group
     - CVE-2020-15999: Heap buffer overflow in Freetype. Reported by Sergei
       Glazunov of Google Project Zero
     - CVE-2020-16003: Use after free in printing. Reported by Khalil Zhani
     - CVE-2020-15967: Use after free in payments. Reported by Man Yue Mo of
       GitHub Security Lab
     - CVE-2020-15968: Use after free in Blink. Reported by Anonymous
     - CVE-2020-15969: Use after free in WebRTC. Reported by Anonymous
     - CVE-2020-15970: Use after free in NFC. Reported by Man Yue Mo of GitHub
       Security Lab
     - CVE-2020-15971: Use after free in printing. Reported by Jun Kokatsu,
       Microsoft Browser Vulnerability Research
     - CVE-2020-15972: Use after free in audio. Reported by Anonymous
     - CVE-2020-15990: Use after free in autofill. Reported by Rong Jian and
       Guang Gong of Alpha Lab, Qihoo 360
     - CVE-2020-15991: Use after free in password manager. Reported by Rong Jian
       and Guang Gong of Alpha Lab, Qihoo 360
     - CVE-2020-15973: Insufficient policy enforcement in extensions. Reported
       by David Erceg
     - CVE-2020-15974: Integer overflow in Blink. Reported by Juno Im of Theori
     - CVE-2020-15975: Integer overflow in SwiftShader. Reported by Anonymous
     - CVE-2020-15976: Use after free in WebXR. Reported by YoungJoo Lee
       @ashuu_lee of Raon Whitehat
     - CVE-2020-6557: Inappropriate implementation in networking. Reported by
       Matthias Gierlings and Marcus Brinkmann
     - CVE-2020-15977: Insufficient data validation in dialogs. Reported by
       Narendra Bhati
     - CVE-2020-15978: Insufficient data validation in navigation. Reported by
       Luan Herrera @lbherrera_
     - CVE-2020-15979: Inappropriate implementation in V8. Reported by Avihay
       Cohen @ SeraphicAlgorithms
     - CVE-2020-15980: Insufficient policy enforcement in Intents. Reported by
       Yongke Wang @Rudykewang and Aryb1n @aryb1n of Tencent Security Xuanwu Lab
     - CVE-2020-15981: Out of bounds read in audio. Reported by Christoph
       Guttandin
     - CVE-2020-15982: Side-channel information leakage in cache. Reported by
       Luan Herrera @lbherrera_
     - CVE-2020-15983: Insufficient data validation in webUI. Reported by Jun
       Kokatsu, Microsoft Browser Vulnerability Research
     - CVE-2020-15984: Insufficient policy enforcement in Omnibox. Reported by
       Rayyan Bijoora
     - CVE-2020-15985: Inappropriate implementation in Blink. Reported by
       Abdulrahman Alqabandi, Microsoft Browser Vulnerability Research
     - CVE-2020-15986: Integer overflow in media. Reported by Mark Brand of
       Google Project Zero
     - CVE-2020-15987: Use after free in WebRTC. Reported by Philipp Hancke
     - CVE-2020-15992: Insufficient policy enforcement in networking. Reported
       by Alison Huffman, Microsoft Browser Vulnerability Research
     - CVE-2020-15988: Insufficient policy enforcement in downloads. Reported by
       Samuel Attard
     - CVE-2020-15989: Uninitialized Use in PDFium. Reported by Gareth Evans
     - CVE-2020-15960: Out of bounds read in storage. Reported by Anonymous
     - CVE-2020-15961: Insufficient policy enforcement in extensions. Reported
       by David Erceg
     - CVE-2020-15962: Insufficient policy enforcement in serial. Reported by
       Leecraso and Guang Gong of 360 Alpha Lab working with 360 BugCloud
     - CVE-2020-15963: Insufficient policy enforcement in extensions. Reported
       by David Erceg
     - CVE-2020-15965: Out of bounds write in V8. Reported by Lucas Pinheiro,
       Microsoft Browser Vulnerability Research
     - CVE-2020-15966: Insufficient policy enforcement in extensions. Reported
       by David Erceg
     - CVE-2020-15964: Insufficient data validation in media. Reported by Woojin
       Oh @pwn_expoit of STEALIEN
     - CVE-2020-6573: Use after free in video. Reported by Leecraso and Guang
       Gong of 360 Alpha Lab working with 360 BugCloud
     - CVE-2020-6574: Insufficient policy enforcement in installer. Reported by
       CodeColorist of Ant-Financial LightYear Labs
     - CVE-2020-6575: Race in Mojo. Reported by Microsoft
     - CVE-2020-6576: Use after free in offscreen canvas. Reported by Looben
       Yang
     - CVE-2020-15959: Insufficient policy enforcement in networking. Reported
       by Eric Lawrence of Microsoft
     - CVE-2020-6558: Insufficient policy enforcement in iOS. Reported by Alison
       Huffman, Microsoft Browser Vulnerability Research
     - CVE-2020-6559: Use after free in presentation API. Reported by Liu Wei
       and Wu Zekai of Tencent Security Xuanwu Lab
     - CVE-2020-6560: Insufficient policy enforcement in autofill. Reported by
       Nadja Ungethuem from www.unnex.de
     - CVE-2020-6561: Inappropriate implementation in Content Security Policy.
       Reported by Rob Wu
     - CVE-2020-6562: Insufficient policy enforcement in Blink. Reported by
       Masato Kinugawa
     - CVE-2020-6563: Insufficient policy enforcement in intent handling.
       Reported by Pedro Oliveira
     - CVE-2020-6564: Incorrect security UI in permissions. Reported by Khalil
       Zhani
     - CVE-2020-6565: Incorrect security UI in Omnibox. Reported by Khalil Zhani
     - CVE-2020-6566: Insufficient policy enforcement in media. Reported by Jun
       Kokatsu, Microsoft Browser Vulnerability Research
     - CVE-2020-6567: Insufficient validation of untrusted input in command line
       handling. Reported by Joshua Graham of TSS
     - CVE-2020-6568: Insufficient policy enforcement in intent handling.
       Reported by Yongke Wang @Rudykewang and Aryb1n @aryb1n of Tencent
       Security Xuanwu Lab
     - CVE-2020-6569: Integer overflow in WebUSB. Reported by guaixiaomei
     - CVE-2020-6570: Side-channel information leakage in WebRTC. Reported by
       Signal/Tenable
     - CVE-2020-6571: Incorrect security UI in Omnibox. Reported by Rayyan
       Bijoora
     - CVE-2020-6556: Heap buffer overflow in SwiftShader. Reported by Alison
       Huffman, Microsoft Browser Vulnerability Research
     - CVE-2020-6542: Use after free in ANGLE. Reported by Piotr Bania of Cisco
       Talos
     - CVE-2020-6543: Use after free in task scheduling. Reported by Looben Yang
     - CVE-2020-6544: Use after free in media. Reported by Tim Becker of Theori
     - CVE-2020-6545: Use after free in audio. Reported by Anonymous
     - CVE-2020-6546: Inappropriate implementation in installer. Reported by
       Andrew Hess
     - CVE-2020-6547: Incorrect security UI in media. Reported by David Albert
     - CVE-2020-6548: Heap buffer overflow in Skia. Reported by Choongwoo Han,
       Microsoft Browser Vulnerability Research
     - CVE-2020-6549: Use after free in media. Reported by Sergei Glazunov of
       Google Project Zero
     - CVE-2020-6550: Use after free in IndexedDB. Reported by Sergei Glazunov
       of Google Project Zero
     - CVE-2020-6551: Use after free in WebXR. Reported by Sergei Glazunov of
       Google Project Zero
     - CVE-2020-6552: Use after free in Blink. Reported by Tim Becker of Theori
     - CVE-2020-6553: Use after free in offline mode. Reported by Alison
       Huffman, Microsoft Browser Vulnerability Research
     - CVE-2020-6554: Use after free in extensions. Reported by Anonymous
     - CVE-2020-6555: Out of bounds read in WebGL. Reported by Marcin Towalski
       of Cisco Talos
   * Add 64-bit time syscalls to syscall whitelist and clock selection
     parameter filtering code.
   * Switch to explicitly versioned python2.
   * Update information in debian/copyright.
   * Include more upstream metadata information.
   * Install ANGLE EGL and GLESv2 libs.
Checksums-Sha1:
 fe1ae3c29acb997d97f6f31c3081f3798194120e 3601 chromium_87.0.4280.88-0.4~deb10u1.dsc
 9c079c481a3d5c5df757b1cb84c9236e4c5c9c8b 393356668 chromium_87.0.4280.88.orig.tar.xz
 97ec58bf71d49a7c3c8461f7bdc5fa94b27e99a5 189508 chromium_87.0.4280.88-0.4~deb10u1.debian.tar.xz
 f54df7f116e00e847d8303fcd74112e5a551877f 14923 chromium_87.0.4280.88-0.4~deb10u1_source.buildinfo
Checksums-Sha256:
 039a4f95b07572b51399b24b92458795995861cda2649c90e002347dcef446d2 3601 chromium_87.0.4280.88-0.4~deb10u1.dsc
 b285589a46b7f7e0375f284e27959fa6da72d4dac47cdf1b090cd8abf71e8c92 393356668 chromium_87.0.4280.88.orig.tar.xz
 dbb805f90c63820d96810efdb9c0fb1a19c9f996d384d5163867fef5f8e3489b 189508 chromium_87.0.4280.88-0.4~deb10u1.debian.tar.xz
 557aaf5aa5114d7ef4fe7c4fc4829e71f696c02e0cb1d1e9709c759216c433ff 14923 chromium_87.0.4280.88-0.4~deb10u1_source.buildinfo
Files:
 9935ceea8ffd94f94de6d9f98dd90c3d 3601 web optional chromium_87.0.4280.88-0.4~deb10u1.dsc
 dbd764f3ac033e137af4b8bb59597feb 393356668 web optional chromium_87.0.4280.88.orig.tar.xz
 09a9ad3b4b42a44ccc39ae57cb1a239d 189508 web optional chromium_87.0.4280.88-0.4~deb10u1.debian.tar.xz
 5d579a81d6151ba3ae8d395da4afe1e9 14923 web optional chromium_87.0.4280.88-0.4~deb10u1_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=hEGR
-----END PGP SIGNATURE-----