Back to chromium PTS page

Accepted chromium 112.0.5615.49-1 (source) into unstable



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Tue, 04 Apr 2023 18:44:47 -0400
Source: chromium
Architecture: source
Version: 112.0.5615.49-1
Distribution: unstable
Urgency: high
Maintainer: Debian Chromium Team <chromium@packages.debian.org>
Changed-By: Andres Salomon <dilinger@debian.org>
Changes:
 chromium (112.0.5615.49-1) unstable; urgency=high
 .
   * New upstream stable release.
     - CVE-2023-1810: Heap buffer overflow in Visuals.
       Reported by Weipeng Jiang (@Krace) of VRI.
     - CVE-2023-1811: Use after free in Frames. Reported by Thomas Orlita.
     - CVE-2023-1812: Out of bounds memory access in DOM Bindings.
       Reported by Shijiang Yu.
     - CVE-2023-1813: Inappropriate implementation in Extensions.
       Reported by Axel Chong.
     - CVE-2023-1814: Insufficient validation of untrusted input in
       Safe Browsing. Reported by Young Min Kim (@ylemkimon),
       CompSec Lab at Seoul National University.
     - CVE-2023-1815: Use after free in Networking APIs. Reported by DDV_UA.
     - CVE-2023-1816: Incorrect security UI in Picture In Picture.
       Reported by NDevTK.
     - CVE-2023-1817: Insufficient policy enforcement in Intents.
       Reported by Axel Chong.
     - CVE-2023-1818: Use after free in Vulkan. Reported by Abdulrahman
       Alqabandi, Microsoft Browser Vulnerability Research, Eric Lawrence,
       Microsoft, Patrick Walker (@HomeSen), & Kirtikumar Anandrao Ramchandani.
     - CVE-2023-1819: Out of bounds read in Accessibility.
       Reported by Microsoft Edge Team.
     - CVE-2023-1820: Heap buffer overflow in Browser History.
       Reported by raven at KunLun lab.
     - CVE-2023-1821: Inappropriate implementation in WebShare.
       Reported by Axel Chong.
     - CVE-2023-1822: Incorrect security UI in Navigation. Reported by 강우진.
     - CVE-2023-1823: Inappropriate implementation in FedCM.
       Reported by Jasper Rebane (popstonia).
   * d/copyright: change location for deleted image_diff directory.
   * d/patches:
     - disable/unrar.patch: update for stuff dropped upstream.
     - disable/swiftshader.patch: straight refresh.
     - bullseye/clang13.patch: straight refresh.
     - ppc64le/third_party/0001-third_party-angle-Include-missing-header-cstddef-in-.patch:
       straight refresh.
     - ppc64le/third_party/use-sysconf-page-size-on-ppc64.patch: straight
       refresh.
     - debian/patches/ppc64le/third_party/0003-third_party-ffmpeg-Add-ppc64-generated-config.patch:
       change is_mac to is_apple.
Checksums-Sha1:
 2240e659c509a5a416dc0d9b0e64b4e4242486a1 3684 chromium_112.0.5615.49-1.dsc
 a04a362826316ceddfdb80871ff805928e099e41 661675416 chromium_112.0.5615.49.orig.tar.xz
 cbec06b1160484ae49bc808aabdae3dfcf351985 298464 chromium_112.0.5615.49-1.debian.tar.xz
 a722fd9aa4d672a436bbd43a0b17be6e40ee4628 20577 chromium_112.0.5615.49-1_source.buildinfo
Checksums-Sha256:
 364acd095175d100fdc35bb17824d2afbbf36f170ca864dbef87770ec4b909c1 3684 chromium_112.0.5615.49-1.dsc
 a70a4c72d5ba72ede51999d075e07b696dbba93f8e4790fe21b3c7abdddbebc3 661675416 chromium_112.0.5615.49.orig.tar.xz
 2107cbda1f3fc7375c0853e76fb68a404542c08162c7ba9717913b2b188d44be 298464 chromium_112.0.5615.49-1.debian.tar.xz
 b565dc3d0e16cfff80c38ad5b01e5e2b2e8174ebf0f5760dcad2d5a107f9d5c7 20577 chromium_112.0.5615.49-1_source.buildinfo
Files:
 bbb2b4db7c4b0ecb2ab15d6ac5380a8a 3684 web optional chromium_112.0.5615.49-1.dsc
 6889caf6a47d1a38c07eb4a054e6e49d 661675416 web optional chromium_112.0.5615.49.orig.tar.xz
 b7450e7e817552d50441c4249e30667a 298464 web optional chromium_112.0.5615.49-1.debian.tar.xz
 4b643427041ea16b219ccf88425e6bcd 20577 web optional chromium_112.0.5615.49-1_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=pP3G
-----END PGP SIGNATURE-----