Accepted chromium 112.0.5615.49-1 (source) into unstable
- To: debian-devel-changes@lists.debian.org
- Subject: Accepted chromium 112.0.5615.49-1 (source) into unstable
- From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
- Date: Tue, 04 Apr 2023 23:51:20 +0000
- Debian: DAK
- Debian-architecture: source
- Debian-archive-action: accept
- Debian-changes: chromium_112.0.5615.49-1_source.changes
- Debian-source: chromium
- Debian-suite: unstable
- Debian-version: 112.0.5615.49-1
- Dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=ftp-master.debian.org; s=smtpauto.fasolo; h=Date:Message-Id: Content-Transfer-Encoding:Content-Type:Subject:MIME-Version:To:Reply-To:From: Cc:Content-ID:Content-Description:In-Reply-To:References; bh=+qDSPlMIUAaDKo0Y98datbWEAfTPoBT0i1A3xMRzKKk=; b=V9VaIgFIv8EVE9Gl9Nyjgzsb0l 1Z3zXmSzRMqNTY8qOyA2Oehf3RJgEj2rqYgWAOPbCg69psthEP5LlBu9qQj2jKakWp6y4YVktaBo1 4IMUM7/OBNHGoiurNtZLNUZUcOPc/O9jII1YdzXRNm7osCbhfZsthitS57jqEXmOYrIMokbgG/iCS bK38XLWGohD4B+MLpMDyf/ZkXd6tlSNRqfYrJvMghCbyP4yAQgYJMAMjExGZWHUFw/c7oOH3OVQ1z OoUDXfe+vG6CP8/1XcslqbrHdCb85fif5KZpOPBcHzemKQjefbDNmYAo+hqKG/6uHbj4jl2QmDpXw I8//1UaA==;
- Mail-followup-to: debian-devel@lists.debian.org
- Message-id: <E1pjqQq-00FCdn-I9@fasolo.debian.org>
- Reply-to: debian-devel@lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Tue, 04 Apr 2023 18:44:47 -0400
Source: chromium
Architecture: source
Version: 112.0.5615.49-1
Distribution: unstable
Urgency: high
Maintainer: Debian Chromium Team <chromium@packages.debian.org>
Changed-By: Andres Salomon <dilinger@debian.org>
Changes:
chromium (112.0.5615.49-1) unstable; urgency=high
.
* New upstream stable release.
- CVE-2023-1810: Heap buffer overflow in Visuals.
Reported by Weipeng Jiang (@Krace) of VRI.
- CVE-2023-1811: Use after free in Frames. Reported by Thomas Orlita.
- CVE-2023-1812: Out of bounds memory access in DOM Bindings.
Reported by Shijiang Yu.
- CVE-2023-1813: Inappropriate implementation in Extensions.
Reported by Axel Chong.
- CVE-2023-1814: Insufficient validation of untrusted input in
Safe Browsing. Reported by Young Min Kim (@ylemkimon),
CompSec Lab at Seoul National University.
- CVE-2023-1815: Use after free in Networking APIs. Reported by DDV_UA.
- CVE-2023-1816: Incorrect security UI in Picture In Picture.
Reported by NDevTK.
- CVE-2023-1817: Insufficient policy enforcement in Intents.
Reported by Axel Chong.
- CVE-2023-1818: Use after free in Vulkan. Reported by Abdulrahman
Alqabandi, Microsoft Browser Vulnerability Research, Eric Lawrence,
Microsoft, Patrick Walker (@HomeSen), & Kirtikumar Anandrao Ramchandani.
- CVE-2023-1819: Out of bounds read in Accessibility.
Reported by Microsoft Edge Team.
- CVE-2023-1820: Heap buffer overflow in Browser History.
Reported by raven at KunLun lab.
- CVE-2023-1821: Inappropriate implementation in WebShare.
Reported by Axel Chong.
- CVE-2023-1822: Incorrect security UI in Navigation. Reported by 강우진.
- CVE-2023-1823: Inappropriate implementation in FedCM.
Reported by Jasper Rebane (popstonia).
* d/copyright: change location for deleted image_diff directory.
* d/patches:
- disable/unrar.patch: update for stuff dropped upstream.
- disable/swiftshader.patch: straight refresh.
- bullseye/clang13.patch: straight refresh.
- ppc64le/third_party/0001-third_party-angle-Include-missing-header-cstddef-in-.patch:
straight refresh.
- ppc64le/third_party/use-sysconf-page-size-on-ppc64.patch: straight
refresh.
- debian/patches/ppc64le/third_party/0003-third_party-ffmpeg-Add-ppc64-generated-config.patch:
change is_mac to is_apple.
Checksums-Sha1:
2240e659c509a5a416dc0d9b0e64b4e4242486a1 3684 chromium_112.0.5615.49-1.dsc
a04a362826316ceddfdb80871ff805928e099e41 661675416 chromium_112.0.5615.49.orig.tar.xz
cbec06b1160484ae49bc808aabdae3dfcf351985 298464 chromium_112.0.5615.49-1.debian.tar.xz
a722fd9aa4d672a436bbd43a0b17be6e40ee4628 20577 chromium_112.0.5615.49-1_source.buildinfo
Checksums-Sha256:
364acd095175d100fdc35bb17824d2afbbf36f170ca864dbef87770ec4b909c1 3684 chromium_112.0.5615.49-1.dsc
a70a4c72d5ba72ede51999d075e07b696dbba93f8e4790fe21b3c7abdddbebc3 661675416 chromium_112.0.5615.49.orig.tar.xz
2107cbda1f3fc7375c0853e76fb68a404542c08162c7ba9717913b2b188d44be 298464 chromium_112.0.5615.49-1.debian.tar.xz
b565dc3d0e16cfff80c38ad5b01e5e2b2e8174ebf0f5760dcad2d5a107f9d5c7 20577 chromium_112.0.5615.49-1_source.buildinfo
Files:
bbb2b4db7c4b0ecb2ab15d6ac5380a8a 3684 web optional chromium_112.0.5615.49-1.dsc
6889caf6a47d1a38c07eb4a054e6e49d 661675416 web optional chromium_112.0.5615.49.orig.tar.xz
b7450e7e817552d50441c4249e30667a 298464 web optional chromium_112.0.5615.49-1.debian.tar.xz
4b643427041ea16b219ccf88425e6bcd 20577 web optional chromium_112.0.5615.49-1_source.buildinfo
-----BEGIN PGP SIGNATURE-----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=pP3G
-----END PGP SIGNATURE-----