Accepted chromium 112.0.5615.138-1 (source) into unstable
- To: debian-devel-changes@lists.debian.org
- Subject: Accepted chromium 112.0.5615.138-1 (source) into unstable
- From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
- Date: Thu, 20 Apr 2023 02:06:05 +0000
- Debian: DAK
- Debian-architecture: source
- Debian-archive-action: accept
- Debian-changes: chromium_112.0.5615.138-1_source.changes
- Debian-source: chromium
- Debian-suite: unstable
- Debian-version: 112.0.5615.138-1
- Dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=ftp-master.debian.org; s=smtpauto.fasolo; h=Date:Message-Id: Content-Transfer-Encoding:Content-Type:Subject:MIME-Version:To:Reply-To:From: Cc:Content-ID:Content-Description:In-Reply-To:References; bh=UjIBK5bolHPeP0+W094zzq7TxxshSOp/UIqkhiVjk4M=; b=ke9hsP5efPAI80/VGfGIgsFG1d TX5IDcrjXcCZd6P5F595ZNbDPphaSKzpdJPpXPgr2BoeGuC8HmpyHWsRc1/reSBax0r8XXvH3NkMV cctOGLwU0i6RLjKX2G9T1ykjVOK6wxxmZ40bWcnd6xD28/M1ZJe2kxB670AXWK4FqlrPuExVX6HNp O80AnnW5ol7msd7t+UlFbJnMCPU8/YsRQ/OqJE+vaKZaRAQR0FmWDZewZ4pTFZ72mR8PnWlM+tlKd sqBPnghU5zgdIImDuZcbP4TH20CThbULyzpqNuqKqWUIWSqDrsdR1x54N2Ah7oT3jjY43RssLzJgz XQnne91w==;
- Mail-followup-to: debian-devel@lists.debian.org
- Message-id: <E1ppJgT-001wBg-7y@fasolo.debian.org>
- Reply-to: debian-devel@lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Tue, 18 Apr 2023 22:00:00 -0500
Source: chromium
Architecture: source
Version: 112.0.5615.138-1
Distribution: unstable
Urgency: high
Maintainer: Debian Chromium Team <chromium@packages.debian.org>
Changed-By: Timothy Pearson <tpearson@raptorengineering.com>
Changes:
chromium (112.0.5615.138-1) unstable; urgency=high
.
* New upstream security release.
- CVE-2023-2133: Out of bounds memory access in Service Worker API.
Reported by Rong Jian of VRI.
- CVE-2023-2134: Out of bounds memory access in Service Worker API.
Reported by Rong Jian of VRI.
- CVE-2023-2135: Use after free in DevTools.
Reported by Cassidy Kim(@cassidy6564).
- CVE-2023-2136: Integer overflow in Skia.
Reported by Clément Lecigne of Google's Threat Analysis Group.
- CVE-2023-2137: Heap buffer overflow in sqlite.
Reported by Nan Wang(@eternalsakura13) and Guang Gong of 360 Vulnerability Research Institute
* d/patches:
- upstream/protobuf.patch: drop, merged upstream.
Checksums-Sha1:
ad2e2a9f43d09c84ef385467c7712b999140b48a 3670 chromium_112.0.5615.138-1.dsc
4a82c90f9f1a36ed65f8810501f5ca1e348de10e 662377800 chromium_112.0.5615.138.orig.tar.xz
9df6a4ccd0664320e438bc280018ea206c7f3812 344124 chromium_112.0.5615.138-1.debian.tar.xz
453401a9ef5be494067adef73b345a6d1df02b7e 20650 chromium_112.0.5615.138-1_source.buildinfo
Checksums-Sha256:
a0739f39729420265ba096370fb036c296069824837ec5a366509eb49f45cae5 3670 chromium_112.0.5615.138-1.dsc
b77e8c3cc5314cfa42d8f02d197741500bda6ea1620019b48d81b5f05ec0c131 662377800 chromium_112.0.5615.138.orig.tar.xz
fd9197f1fba045328cd914762562f3824b18b06034b745d8b52f9fcf8c5a14f4 344124 chromium_112.0.5615.138-1.debian.tar.xz
1cb22e8ffce2948a439630ffffe1157453cda3d6838f1f1cffe2c48dda43685c 20650 chromium_112.0.5615.138-1_source.buildinfo
Files:
318e68ae32b1d978d01cd1f0fec8cdb9 3670 web optional chromium_112.0.5615.138-1.dsc
adc96efc6b2543892a03fd683cf82573 662377800 web optional chromium_112.0.5615.138.orig.tar.xz
609e42c93ede6eb7fc47c807379862eb 344124 web optional chromium_112.0.5615.138-1.debian.tar.xz
80e178f637c91e9369a684da36b30ed9 20650 web optional chromium_112.0.5615.138-1_source.buildinfo
-----BEGIN PGP SIGNATURE-----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=HU6L
-----END PGP SIGNATURE-----