Accepted chromium 106.0.5249.119-1~deb11u1 (source) into proposed-updates
- To: debian-changes@lists.debian.org
- Subject: Accepted chromium 106.0.5249.119-1~deb11u1 (source) into proposed-updates
- From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
- Date: Fri, 14 Oct 2022 11:17:08 +0000
- Debian: DAK
- Debian-architecture: source
- Debian-archive-action: accept
- Debian-changes: chromium_106.0.5249.119-1~deb11u1_source.changes
- Debian-source: chromium
- Debian-suite: proposed-updates
- Debian-version: 106.0.5249.119-1~deb11u1
- Dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=ftp-master.debian.org; s=smtpauto.fasolo; h=Date:Message-Id: Content-Transfer-Encoding:Content-Type:Subject:MIME-Version:To:Reply-To:From: Cc:Content-ID:Content-Description:In-Reply-To:References; bh=lWc2+S7SW8CS4HGmI0k/SAWM8zDo4O2JDjlu3a9uc28=; b=WZ/kKnSqZdlz9bjkydAYqTmrGW zKIcUe9AiuytMgbcVeFEjSsUXCi4ort+w9CU2GCdZ9nlmeaUFjOKxH4HoHhTRVHt2d0xF0F4a+sBp iztFxuwZvnnl8r3BvtVNx17x2DKkGnbrmaRv5gwj7qNjWUPFx4ZYD9AAwO4DnAEu9P6mPb06+4cSo esE5BArg4kSZDvOSioAgt5Ms26N6hsVDe/VRxYoMkIaELkOnvYYknP+9evF3T84RZH9PNB2ZDmP03 vRrzS5GC3NcSXZV/qlc+zarUwrsNMuZBkcytB3vL90ciMdacP1AcDwp0G6bE5LpuYjJwYFkcPdcar 1B/mMrHw==;
- Mail-followup-to: debian-devel@lists.debian.org
- Message-id: <E1ojIge-00HWSl-Oy@fasolo.debian.org>
- Reply-to: debian-devel@lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Tue, 11 Oct 2022 19:42:00 -0500
Source: chromium
Architecture: source
Version: 106.0.5249.119-1~deb11u1
Distribution: bullseye-security
Urgency: high
Maintainer: Debian Chromium Team <chromium@packages.debian.org>
Changed-By: Timothy Pearson <tpearson@raptorengineering.com>
Changes:
chromium (106.0.5249.119-1~deb11u1) bullseye-security; urgency=high
.
* New upstream security release.
- CVE-2022-3445: Use after free in Skia. Reported by Nan Wang
(@eternalsakura13) and Yong Liu of 360 Vulnerability Research Institute on
2022-09-16
- CVE-2022-3446: Heap buffer overflow in WebSQL. Reported by Kaijie Xu
(@kaijieguigui) on 2022-09-26
- CVE-2022-3447: Inappropriate implementation in Custom Tabs. Reported by
Narendra Bhati of Suma Soft Pvt. Ltd. Pune (India) on 2022-09-22
- CVE-2022-3448: Use after free in Permissions API. Reported by raven at
KunLun lab on 2022-09-13
- CVE-2022-3449: Use after free in Safe Browsing. Reported by asnine on
2022-09-17
- CVE-2022-3450: Use after free in Peer Connection. Reported by Anonymous on
2022-09-30
.
chromium (106.0.5249.103-2) unstable; urgency=low
.
* Reduce baseline compatibility for ppc64el builds from POWER9
to POWER8. This matches the current Debian build farm.
.
chromium (106.0.5249.103-1) unstable; urgency=medium
.
* New upstream release.
* Add ppc64el patches maintained by me, and enable builds for ppc64el
(closes #1005083).
Checksums-Sha1:
39405813aa20c52bede13174da741926e59fa363 3808 chromium_106.0.5249.119-1~deb11u1.dsc
e8d439b0799c5f99e0384bd1869212ab76ae3550 645344396 chromium_106.0.5249.119.orig.tar.xz
61b39120f5cad6192739dbcca7128d8898fd9fb0 290044 chromium_106.0.5249.119-1~deb11u1.debian.tar.xz
d5c6dd3c713a7323d95d7268ce4530290c62071e 21205 chromium_106.0.5249.119-1~deb11u1_source.buildinfo
Checksums-Sha256:
5c4529930464c2aecf3b71e7d0d6d00925a8a9fe182bfd2471855de3300caf79 3808 chromium_106.0.5249.119-1~deb11u1.dsc
537e0b16f64870133014cd2511628f00fe7754920a10f47a5b4aa1521edd6c15 645344396 chromium_106.0.5249.119.orig.tar.xz
83c12a2c74f446fec769ee3e3b1afe4c57cee5165e280786c37b4617c140ca11 290044 chromium_106.0.5249.119-1~deb11u1.debian.tar.xz
3a052aac42939b6b7a00f48ca1f47cf9a173a74f83a653e24e5a139a263afadd 21205 chromium_106.0.5249.119-1~deb11u1_source.buildinfo
Files:
cf49f6590a69220f585276f9c1042f5f 3808 web optional chromium_106.0.5249.119-1~deb11u1.dsc
5a88c0954c9a4a829428358a0db78ac7 645344396 web optional chromium_106.0.5249.119.orig.tar.xz
0a9a3968448c346f7a00e5522b7d3625 290044 web optional chromium_106.0.5249.119-1~deb11u1.debian.tar.xz
c3d7802e2d733e36e9c0553184abafc8 21205 web optional chromium_106.0.5249.119-1~deb11u1_source.buildinfo
-----BEGIN PGP SIGNATURE-----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=2dyk
-----END PGP SIGNATURE-----